[ { "filename": "/tekton/home/tpa-report-amd64.json", "namespace": "required_checks", "successes": 4, "warnings": [ { "msg": "Found 12 critical vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm [direct] (CVE-2024-12084), pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2023-39332), pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [direct] (CVE-2024-32002), pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [direct] (CVE-2024-32002), pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [direct] (CVE-2023-24538), pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2023-39332), pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm [direct] (CVE-2023-24538), pkg:rpm/redhat/nodejs-docs@16.18.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2023-39332), pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm [direct] (CVE-2023-24538), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [direct] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/nodejs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-39332), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssh-clients@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-38408), pkg:rpm/redhat/openssh@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-38408), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssh@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-38408), pkg:rpm/redhat/openssh-clients@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-38408), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-32002), pkg:rpm/redhat/perl-Git@2.31.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-32002), pkg:rpm/redhat/git-core-doc@2.31.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-32002), pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-32002), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-24538), pkg:rpm/redhat/golang-src@1.18.9-1.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-24538), pkg:rpm/redhat/golang-bin@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-24538), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/nodejs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-39332), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libwebp@1.2.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libwebp-1.2.0-3.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4863), pkg:rpm/redhat/libwebp-devel@1.2.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libwebp-1.2.0-3.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4863), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-24538), pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-24538), pkg:rpm/redhat/golang-src@1.18.9-1.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-24538), pkg:rpm/redhat/golang-bin@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-24538), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/libwebp@1.2.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libwebp-1.2.0-3.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-4863), pkg:rpm/redhat/libwebp@1.2.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libwebp-1.2.0-3.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4863), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/libwebp@1.2.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libwebp-1.2.0-3.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-4863), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/ca-certificates@2022.2.54-90.2.el9_0?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ca-certificates-2022.2.54-90.2.el9_0.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796)", "name": "rhtpa_critical_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 12 } }, { "msg": "Found 302 high vulnerabilities.", "metadata": { "details": { "description": "Source: osv-github. Affected dependencies: pkg:pypi/setuptools@53.0.0 [direct] (CVE-2024-6345, CVE-2022-40897), pkg:npm/tar@6.1.11 [direct] (CVE-2026-23950, CVE-2026-24842, CVE-2026-26960), pkg:npm/ip@2.0.0 [direct] (CVE-2024-29415), pkg:npm/http-cache-semantics@4.1.0 [direct] (CVE-2022-25881), pkg:npm/minimatch@5.1.0 [direct] (CVE-2026-27903, CVE-2026-27904), pkg:npm/semver@7.3.7 [direct] (CVE-2022-25883), pkg:npm/minimatch@3.1.2 [direct] (CVE-2026-27903, CVE-2026-27904), pkg:npm/npm@8.19.2 [direct] (CVE-2026-0775), pkg:pypi/urllib3@1.26.5 [transitive via pkg:pypi/requests@2.25.1] (CVE-2026-21441); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [direct] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm [direct] (CVE-2023-3899), pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm [direct] (CVE-2024-12085), pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [direct] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm [direct] (CVE-2025-27363), pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2023-32006, CVE-2022-4904, CVE-2022-21824, CVE-2023-32002, CVE-2024-21892, CVE-2024-21896, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-38552, CVE-2023-39331, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2021-44531, CVE-2021-44532, CVE-2021-44533, CVE-2024-22017, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [direct] (CVE-2022-39260, CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2022-24765, CVE-2022-29187, CVE-2023-29007, CVE-2023-23946, CVE-2023-25652, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [direct] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [direct] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [direct] (CVE-2022-39260, CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2022-24765, CVE-2022-29187, CVE-2023-29007, CVE-2023-23946, CVE-2023-25652, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm [direct] (CVE-2023-3899), pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [direct] (CVE-2025-4674, CVE-2025-61731, CVE-2023-24540, CVE-2023-39323, CVE-2023-29403, CVE-2022-2880, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-29404, CVE-2023-29405, CVE-2023-39321, CVE-2023-39322, CVE-2023-39325, CVE-2023-44487, CVE-2023-45285, CVE-2023-45288, CVE-2024-1394, CVE-2024-24788, CVE-2024-34156, CVE-2025-22874, CVE-2025-58183, CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2026-25679, CVE-2025-61732, CVE-2025-68121, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2025-47907), pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2023-32006, CVE-2022-4904, CVE-2022-21824, CVE-2022-35255, CVE-2023-32002, CVE-2024-21892, CVE-2024-21896, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-38552, CVE-2023-39331, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2021-44531, CVE-2021-44532, CVE-2021-44533, CVE-2024-22017, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm [direct] (CVE-2025-4674, CVE-2025-61731, CVE-2023-24540, CVE-2023-39323, CVE-2023-29403, CVE-2022-2880, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-29404, CVE-2023-29405, CVE-2023-39321, CVE-2023-39322, CVE-2023-39325, CVE-2023-44487, CVE-2023-45285, CVE-2023-45288, CVE-2024-1394, CVE-2024-34156, CVE-2025-58183, CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2026-25679, CVE-2026-27137, CVE-2025-61732, CVE-2025-68121, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2025-47907), pkg:rpm/redhat/nodejs-docs@16.18.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2023-32006, CVE-2022-4904, CVE-2022-21824, CVE-2022-35255, CVE-2023-32002, CVE-2024-21892, CVE-2024-21896, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-38552, CVE-2023-39331, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2021-44531, CVE-2021-44532, CVE-2021-44533, CVE-2024-22017, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm [direct] (CVE-2025-4674, CVE-2025-61731, CVE-2023-24540, CVE-2023-39323, CVE-2023-29403, CVE-2022-2880, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-29404, CVE-2023-29405, CVE-2023-39321, CVE-2023-39322, CVE-2023-39325, CVE-2023-44487, CVE-2023-45285, CVE-2023-45288, CVE-2024-1394, CVE-2024-24788, CVE-2024-34156, CVE-2025-22874, CVE-2025-58183, CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2026-25679, CVE-2025-61732, CVE-2025-68121, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2025-47907), pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm [direct] (CVE-2025-66418, CVE-2025-66471, CVE-2026-21441), pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm [direct] (CVE-2025-1094, CVE-2025-12818), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [direct] (CVE-2022-3970, CVE-2025-9900, CVE-2025-8176, CVE-2017-17095, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [direct] (CVE-2022-3970, CVE-2025-9900, CVE-2025-8176, CVE-2017-17095, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm [direct] (CVE-2024-55549, CVE-2025-24855, CVE-2025-7425, CVE-2025-7424), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [direct] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [direct] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [direct] (CVE-2025-31115), pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [direct] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [direct] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [direct] (CVE-2025-6176), pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [direct] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [direct] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm [direct] (CVE-2023-30630), pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [direct] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [direct] (CVE-2026-25749, CVE-2026-33412, CVE-2023-4752), pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [direct] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [direct] (CVE-2026-25749, CVE-2026-33412, CVE-2023-4752), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libsolv@0.7.22-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libsolv-0.7.22-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-46877), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-headers@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-44466, CVE-2024-5154, CVE-2025-21927, CVE-2023-1652, CVE-2023-52922, CVE-2024-36971, CVE-2025-21756, CVE-2025-22020, CVE-2025-38052, CVE-2025-38087, CVE-2022-41723, CVE-2025-38471, CVE-2024-42284, CVE-2024-53104, CVE-2025-37750, CVE-2025-38250, CVE-2022-49846, CVE-2023-52933, CVE-2023-53751, CVE-2023-6606, CVE-2023-6610, CVE-2024-35937, CVE-2024-38538, CVE-2024-53150, CVE-2024-57947, CVE-2025-21887, CVE-2025-21893, CVE-2025-21920, CVE-2025-21969, CVE-2025-21979, CVE-2025-21993, CVE-2025-21997, CVE-2025-22026, CVE-2025-22055, CVE-2025-22058, CVE-2025-22104, CVE-2025-22113, CVE-2025-22121, CVE-2025-37738, CVE-2025-37799, CVE-2025-38264, CVE-2022-49977, CVE-2022-50066, CVE-2023-53047, CVE-2023-53107, CVE-2023-6932, CVE-2024-0646, CVE-2024-46858, CVE-2024-50154, CVE-2024-53141, CVE-2025-21727, CVE-2025-21764, CVE-2025-21867, CVE-2025-21919, CVE-2025-21926, CVE-2025-21966, CVE-2025-22004, CVE-2025-22126, CVE-2025-37797, CVE-2025-37803, CVE-2025-37890, CVE-2025-37914, CVE-2025-37943, CVE-2025-38079, CVE-2025-38086, CVE-2025-38124, CVE-2025-38177, CVE-2025-38200, CVE-2025-38332, CVE-2025-38350), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-devel@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-B@1.80-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-AutoLoader@5.74-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-FileHandle@2.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-base@2.27-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Digest-1.19-4.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libsolv@0.7.22-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libsolv-0.7.22-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2021-46877), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/go-srpm-macros@3.0.9-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=go-rpm-macros-3.0.9-9.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-61726, CVE-2026-25679), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/systemd@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/graphite2@1.3.14-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=graphite2-1.3.14-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2017-5436), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-27363), pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-27363), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/glib2-devel@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-33636, CVE-2026-33416, CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), pkg:rpm/redhat/brotli-devel@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/harfbuzz-devel@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/harfbuzz-icu@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/libpng-devel@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), pkg:rpm/redhat/pixman@0.40.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pixman-0.40.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2022-44638), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/nodejs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-32006, CVE-2022-4904, CVE-2022-21824, CVE-2022-35255, CVE-2023-32002, CVE-2024-21892, CVE-2024-21896, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-38552, CVE-2023-39331, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2021-44531, CVE-2021-44532, CVE-2021-44533, CVE-2024-22017, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/nodejs-libs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-32006, CVE-2022-4904, CVE-2023-32002, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2023-23918, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=less-590-1.el9_0.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2024-32487, CVE-2022-46663, CVE-2022-48624), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2026-25749, CVE-2026-33412, CVE-2023-4752), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssh-clients@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-3497, CVE-2024-6387, CVE-2024-6409), pkg:rpm/redhat/openssh@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-3497, CVE-2024-6387, CVE-2023-51767, CVE-2024-6409), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=less-590-1.el9_0.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-32487, CVE-2022-46663, CVE-2022-48624), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssh@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-3497, CVE-2024-6387, CVE-2023-51767, CVE-2024-6409), pkg:rpm/redhat/openssh-clients@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-3497, CVE-2024-6387, CVE-2024-6409), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-39260, CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2022-24765, CVE-2022-29187, CVE-2023-29007, CVE-2023-23946, CVE-2023-25652, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/perl-Git@2.31.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-39260, CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2022-24765, CVE-2022-29187, CVE-2023-29007, CVE-2023-23946, CVE-2023-25652, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/git-core-doc@2.31.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-39260, CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2022-24765, CVE-2022-29187, CVE-2023-29007, CVE-2023-23946, CVE-2023-25652, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-39260, CVE-2025-48385, CVE-2024-32004, CVE-2025-48384, CVE-2022-24765, CVE-2022-29187, CVE-2023-29007, CVE-2023-23946, CVE-2023-25652, CVE-2024-52005, CVE-2024-32465), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/emacs-filesystem@27.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=emacs-27.2-6.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-1244, CVE-2022-45939, CVE-2022-48339, CVE-2023-2491, CVE-2023-28617, CVE-2024-30205, CVE-2024-39331, CVE-2024-53920, CVE-2022-48337, CVE-2022-48338), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=less-590-1.el9_0.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-32487, CVE-2022-46663, CVE-2022-48624), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Find@1.37-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-DynaLoader@1.47-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-3899), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/python3-subscription-manager-rhsm@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-3899), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/python3-cloud-what@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-3899), pkg:rpm/redhat/systemd@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libsolv@0.7.22-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libsolv-0.7.22-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-46877), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-30630), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-4674, CVE-2025-61731, CVE-2023-24540, CVE-2023-39323, CVE-2023-29403, CVE-2022-2880, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-29404, CVE-2023-29405, CVE-2023-39321, CVE-2023-39322, CVE-2023-39325, CVE-2023-44487, CVE-2023-45285, CVE-2023-45288, CVE-2024-1394, CVE-2024-24788, CVE-2024-34156, CVE-2025-22874, CVE-2025-58183, CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2026-25679, CVE-2025-61732, CVE-2025-68121, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2025-47907), pkg:rpm/redhat/golang-src@1.18.9-1.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-4674, CVE-2025-61731, CVE-2023-24540, CVE-2023-39323, CVE-2023-29403, CVE-2022-2880, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-29404, CVE-2023-29405, CVE-2023-39321, CVE-2023-39322, CVE-2023-39325, CVE-2023-44487, CVE-2023-45285, CVE-2023-45288, CVE-2024-1394, CVE-2024-24788, CVE-2024-34156, CVE-2025-22874, CVE-2025-58183, CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2026-25679, CVE-2025-61732, CVE-2025-68121, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2025-47907), pkg:rpm/redhat/golang-bin@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-4674, CVE-2025-61731, CVE-2023-24540, CVE-2023-39323, CVE-2023-29403, CVE-2022-2880, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-29404, CVE-2023-29405, CVE-2023-39321, CVE-2023-39322, CVE-2023-39325, CVE-2023-44487, CVE-2023-45285, CVE-2023-45288, CVE-2024-1394, CVE-2024-24788, CVE-2024-34156, CVE-2025-22874, CVE-2025-58183, CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2026-25679, CVE-2025-61732, CVE-2025-68121, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2025-47907), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-headers@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-44466, CVE-2024-5154, CVE-2025-21927, CVE-2023-1652, CVE-2023-52922, CVE-2024-36971, CVE-2025-21756, CVE-2025-22020, CVE-2025-38052, CVE-2025-38087, CVE-2022-41723, CVE-2025-38471, CVE-2024-42284, CVE-2024-53104, CVE-2025-37750, CVE-2025-38250, CVE-2022-49846, CVE-2023-52933, CVE-2023-53751, CVE-2023-6606, CVE-2023-6610, CVE-2024-35937, CVE-2024-38538, CVE-2024-53150, CVE-2024-57947, CVE-2025-21887, CVE-2025-21893, CVE-2025-21920, CVE-2025-21969, CVE-2025-21979, CVE-2025-21993, CVE-2025-21997, CVE-2025-22026, CVE-2025-22055, CVE-2025-22058, CVE-2025-22104, CVE-2025-22113, CVE-2025-22121, CVE-2025-37738, CVE-2025-37799, CVE-2025-38264, CVE-2022-49977, CVE-2022-50066, CVE-2023-53047, CVE-2023-53107, CVE-2023-6932, CVE-2024-0646, CVE-2024-46858, CVE-2024-50154, CVE-2024-53141, CVE-2025-21727, CVE-2025-21764, CVE-2025-21867, CVE-2025-21919, CVE-2025-21926, CVE-2025-21966, CVE-2025-22004, CVE-2025-22126, CVE-2025-37797, CVE-2025-37803, CVE-2025-37890, CVE-2025-37914, CVE-2025-37943, CVE-2025-38079, CVE-2025-38086, CVE-2025-38124, CVE-2025-38177, CVE-2025-38200, CVE-2025-38332, CVE-2025-38350), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-devel@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/nodejs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-32006, CVE-2022-4904, CVE-2022-21824, CVE-2022-35255, CVE-2023-32002, CVE-2024-21892, CVE-2024-21896, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2022-25883, CVE-2022-3517, CVE-2022-43548, CVE-2023-23918, CVE-2023-23919, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-38552, CVE-2023-39331, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2021-44531, CVE-2021-44532, CVE-2021-44533, CVE-2024-22017, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2026-28390, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/nodejs-libs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-32006, CVE-2022-4904, CVE-2023-32002, CVE-2025-23083, CVE-2025-6965, CVE-2021-35065, CVE-2022-25881, CVE-2023-23918, CVE-2023-24807, CVE-2023-30581, CVE-2023-30590, CVE-2023-32067, CVE-2023-32559, CVE-2023-44487, CVE-2024-22019, CVE-2024-27983, CVE-2025-23166, CVE-2025-59465, CVE-2026-1526, CVE-2026-1528, CVE-2026-21710, CVE-2026-2229, CVE-2026-27135, CVE-2025-3277, CVE-2026-1525, CVE-2025-55130, CVE-2025-55131, CVE-2023-30589, CVE-2025-31498), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libwebp@1.2.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libwebp-1.2.0-3.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-1999), pkg:rpm/redhat/libwebp-devel@1.2.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libwebp-1.2.0-3.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-1999), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-3970, CVE-2025-9900, CVE-2025-8176, CVE-2017-17095, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-3970, CVE-2025-9900, CVE-2025-8176, CVE-2017-17095, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/graphite2@1.3.14-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=graphite2-1.3.14-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2017-5436), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-27363), pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-27363), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libX11-xcb@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/libX11-devel@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/glib2-devel@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-33636, CVE-2026-33416, CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), pkg:rpm/redhat/brotli-devel@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/xz-devel@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/harfbuzz-devel@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/harfbuzz-icu@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/libjpeg-turbo-devel@2.0.90-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libjpeg-turbo-2.0.90-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2021-29390), pkg:rpm/redhat/libpng-devel@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), pkg:rpm/redhat/libjpeg-turbo@2.0.90-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libjpeg-turbo-2.0.90-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2021-29390), pkg:rpm/redhat/pixman@0.40.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pixman-0.40.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-44638), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/libicu-devel@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=less-590-1.el9_0.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-32487, CVE-2022-46663, CVE-2022-48624), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2026-25749, CVE-2026-33412, CVE-2023-4752), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-headers@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-44466, CVE-2024-5154, CVE-2025-21927, CVE-2023-1652, CVE-2023-52922, CVE-2024-36971, CVE-2025-21756, CVE-2025-22020, CVE-2025-38052, CVE-2025-38087, CVE-2022-41723, CVE-2025-38471, CVE-2024-42284, CVE-2024-53104, CVE-2025-37750, CVE-2025-38250, CVE-2022-49846, CVE-2023-52933, CVE-2023-53751, CVE-2023-6606, CVE-2023-6610, CVE-2024-35937, CVE-2024-38538, CVE-2024-53150, CVE-2024-57947, CVE-2025-21887, CVE-2025-21893, CVE-2025-21920, CVE-2025-21969, CVE-2025-21979, CVE-2025-21993, CVE-2025-21997, CVE-2025-22026, CVE-2025-22055, CVE-2025-22058, CVE-2025-22104, CVE-2025-22113, CVE-2025-22121, CVE-2025-37738, CVE-2025-37799, CVE-2025-38264, CVE-2022-49977, CVE-2022-50066, CVE-2023-53047, CVE-2023-53107, CVE-2023-6932, CVE-2024-0646, CVE-2024-46858, CVE-2024-50154, CVE-2024-53141, CVE-2025-21727, CVE-2025-21764, CVE-2025-21867, CVE-2025-21919, CVE-2025-21926, CVE-2025-21966, CVE-2025-22004, CVE-2025-22126, CVE-2025-37797, CVE-2025-37803, CVE-2025-37890, CVE-2025-37914, CVE-2025-37943, CVE-2025-38079, CVE-2025-38086, CVE-2025-38124, CVE-2025-38177, CVE-2025-38200, CVE-2025-38332, CVE-2025-38350), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-devel@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libsolv@0.7.22-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libsolv-0.7.22-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2021-46877), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-headers@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-44466, CVE-2024-5154, CVE-2025-21927, CVE-2023-1652, CVE-2023-52922, CVE-2024-36971, CVE-2025-21756, CVE-2025-22020, CVE-2025-38052, CVE-2025-38087, CVE-2022-41723, CVE-2025-38471, CVE-2024-42284, CVE-2024-53104, CVE-2025-37750, CVE-2025-38250, CVE-2022-49846, CVE-2023-52933, CVE-2023-53751, CVE-2023-6606, CVE-2023-6610, CVE-2024-35937, CVE-2024-38538, CVE-2024-53150, CVE-2024-57947, CVE-2025-21887, CVE-2025-21893, CVE-2025-21920, CVE-2025-21969, CVE-2025-21979, CVE-2025-21993, CVE-2025-21997, CVE-2025-22026, CVE-2025-22055, CVE-2025-22058, CVE-2025-22104, CVE-2025-22113, CVE-2025-22121, CVE-2025-37738, CVE-2025-37799, CVE-2025-38264, CVE-2022-49977, CVE-2022-50066, CVE-2023-53047, CVE-2023-53107, CVE-2023-6932, CVE-2024-0646, CVE-2024-46858, CVE-2024-50154, CVE-2024-53141, CVE-2025-21727, CVE-2025-21764, CVE-2025-21867, CVE-2025-21919, CVE-2025-21926, CVE-2025-21966, CVE-2025-22004, CVE-2025-22126, CVE-2025-37797, CVE-2025-37803, CVE-2025-37890, CVE-2025-37914, CVE-2025-37943, CVE-2025-38079, CVE-2025-38086, CVE-2025-38124, CVE-2025-38177, CVE-2025-38200, CVE-2025-38332, CVE-2025-38350), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-devel@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-4674, CVE-2025-61731, CVE-2023-24540, CVE-2023-39323, CVE-2023-29403, CVE-2022-2880, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-29404, CVE-2023-29405, CVE-2023-39321, CVE-2023-39322, CVE-2023-39325, CVE-2023-44487, CVE-2023-45285, CVE-2023-45288, CVE-2024-1394, CVE-2024-34156, CVE-2025-58183, CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2026-25679, CVE-2026-27137, CVE-2025-61732, CVE-2025-68121, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2025-47907), pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-4674, CVE-2025-61731, CVE-2023-24540, CVE-2023-39323, CVE-2023-29403, CVE-2022-2880, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-29404, CVE-2023-29405, CVE-2023-39321, CVE-2023-39322, CVE-2023-39325, CVE-2023-44487, CVE-2023-45285, CVE-2023-45288, CVE-2024-1394, CVE-2024-24788, CVE-2024-34156, CVE-2025-22874, CVE-2025-58183, CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2026-25679, CVE-2025-61732, CVE-2025-68121, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2025-47907), pkg:rpm/redhat/golang-src@1.18.9-1.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-4674, CVE-2025-61731, CVE-2023-24540, CVE-2023-39323, CVE-2023-29403, CVE-2022-2880, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-29404, CVE-2023-29405, CVE-2023-39321, CVE-2023-39322, CVE-2023-39325, CVE-2023-44487, CVE-2023-45285, CVE-2023-45288, CVE-2024-1394, CVE-2024-24788, CVE-2024-34156, CVE-2025-22874, CVE-2025-58183, CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2026-25679, CVE-2025-61732, CVE-2025-68121, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2025-47907), pkg:rpm/redhat/golang-bin@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-4674, CVE-2025-61731, CVE-2023-24540, CVE-2023-39323, CVE-2023-29403, CVE-2022-2880, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-24534, CVE-2023-24536, CVE-2023-24537, CVE-2023-29404, CVE-2023-29405, CVE-2023-39321, CVE-2023-39322, CVE-2023-39325, CVE-2023-44487, CVE-2023-45285, CVE-2023-45288, CVE-2024-1394, CVE-2024-24788, CVE-2024-34156, CVE-2025-22874, CVE-2025-58183, CVE-2025-61726, CVE-2025-61728, CVE-2025-61729, CVE-2026-25679, CVE-2025-61732, CVE-2025-68121, CVE-2023-24539, CVE-2023-29400, CVE-2023-29402, CVE-2025-47907), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-headers@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-44466, CVE-2024-5154, CVE-2025-21927, CVE-2023-1652, CVE-2023-52922, CVE-2024-36971, CVE-2025-21756, CVE-2025-22020, CVE-2025-38052, CVE-2025-38087, CVE-2022-41723, CVE-2025-38471, CVE-2024-42284, CVE-2024-53104, CVE-2025-37750, CVE-2025-38250, CVE-2022-49846, CVE-2023-52933, CVE-2023-53751, CVE-2023-6606, CVE-2023-6610, CVE-2024-35937, CVE-2024-38538, CVE-2024-53150, CVE-2024-57947, CVE-2025-21887, CVE-2025-21893, CVE-2025-21920, CVE-2025-21969, CVE-2025-21979, CVE-2025-21993, CVE-2025-21997, CVE-2025-22026, CVE-2025-22055, CVE-2025-22058, CVE-2025-22104, CVE-2025-22113, CVE-2025-22121, CVE-2025-37738, CVE-2025-37799, CVE-2025-38264, CVE-2022-49977, CVE-2022-50066, CVE-2023-53047, CVE-2023-53107, CVE-2023-6932, CVE-2024-0646, CVE-2024-46858, CVE-2024-50154, CVE-2024-53141, CVE-2025-21727, CVE-2025-21764, CVE-2025-21867, CVE-2025-21919, CVE-2025-21926, CVE-2025-21966, CVE-2025-22004, CVE-2025-22126, CVE-2025-37797, CVE-2025-37803, CVE-2025-37890, CVE-2025-37914, CVE-2025-37943, CVE-2025-38079, CVE-2025-38086, CVE-2025-38124, CVE-2025-38177, CVE-2025-38200, CVE-2025-38332, CVE-2025-38350), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-devel@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libpq@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2025-1094, CVE-2025-12818), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/openldap@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openldap-compat@2.6.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openldap-2.6.2-3.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-3358, CVE-2023-5363, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-setuptools-wheel@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-40217, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-38545, CVE-2024-2398), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/libwebp@1.2.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libwebp-1.2.0-3.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-1999), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libjpeg-turbo@2.0.90-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libjpeg-turbo-2.0.90-5.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2021-29390), pkg:rpm/redhat/libwebp@1.2.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libwebp-1.2.0-3.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-1999), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-3970, CVE-2025-9900, CVE-2025-8176, CVE-2017-17095, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/graphite2@1.3.14-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=graphite2-1.3.14-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2017-5436), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-27363), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-33636, CVE-2026-33416, CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-25646), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-25193), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/libjpeg-turbo@2.0.90-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libjpeg-turbo-2.0.90-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2021-29390), pkg:rpm/redhat/libwebp@1.2.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libwebp-1.2.0-3.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-1999), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2022-3970, CVE-2025-9900, CVE-2025-8176, CVE-2017-17095, CVE-2023-52355, CVE-2023-52356, CVE-2024-7006), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libjpeg-turbo@2.0.90-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libjpeg-turbo-2.0.90-5.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2021-29390), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libxslt@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2024-55549, CVE-2025-24855, CVE-2025-7425, CVE-2025-7424), pkg:rpm/redhat/xz-devel@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-56171, CVE-2025-24928, CVE-2025-7425, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-devel@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-FileHandle@2.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-base@2.27-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Digest-1.19-4.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/emacs-filesystem@27.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=emacs-27.2-6.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-1244, CVE-2022-45939, CVE-2022-48339, CVE-2023-2491, CVE-2023-28617, CVE-2024-30205, CVE-2024-39331, CVE-2024-53920, CVE-2022-48337, CVE-2022-48338), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-B@1.80-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Find@1.37-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Compare@1.100.600-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-DynaLoader@1.47-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libbrotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/less@590-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=less-590-1.el9_0.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2024-32487, CVE-2022-46663, CVE-2022-48624), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libicu@67.1-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=icu-67.1-9.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2025-5222), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/libX11-devel@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libX11-xcb@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43787, CVE-2023-3138), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/sqlite-libs@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/emacs-filesystem@27.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=emacs-27.2-6.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-1244, CVE-2022-45939, CVE-2022-48339, CVE-2023-2491, CVE-2023-28617, CVE-2024-30205, CVE-2024-39331, CVE-2024-53920, CVE-2022-48337, CVE-2022-48338), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-B@1.80-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Find@1.37-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Compare@1.100.600-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-DynaLoader@1.47-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-47038), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/xz-libs@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-31115), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-31486, CVE-2023-47038), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2024-56406, CVE-2023-47038), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-47038)", "name": "rhtpa_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 302 } }, { "msg": "Found 404 medium vulnerabilities.", "metadata": { "details": { "description": "Source: osv-github. Affected dependencies: pkg:npm/tar@6.1.11 [direct] (CVE-2024-28863), pkg:pypi/requests@2.25.1 [direct] (CVE-2023-32681, CVE-2024-35195, CVE-2024-47081, CVE-2026-25645), pkg:npm/brace-expansion@1.1.11 [direct] (CVE-2026-33750), pkg:npm/brace-expansion@2.0.1 [direct] (CVE-2026-33750), pkg:pypi/idna@2.10 [direct] (CVE-2024-3651), pkg:pypi/urllib3@1.26.5 [transitive via pkg:pypi/requests@2.25.1] (CVE-2023-43804, CVE-2025-50181, CVE-2024-37891, CVE-2023-45803), pkg:pypi/idna@2.10 [transitive via pkg:pypi/requests@2.25.1] (CVE-2024-3651); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [direct] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [direct] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [direct] (CVE-2020-11023), pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm [direct] (CVE-2024-12087, CVE-2024-12088, CVE-2024-12086, CVE-2024-12747, CVE-2025-10158), pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [direct] (CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [direct] (CVE-2023-34969), pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm [direct] (CVE-2021-3826), pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2025-22150, CVE-2024-21891, CVE-2023-23936, CVE-2024-22020, CVE-2024-22025, CVE-2024-28863, CVE-2025-23167, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2023-46809, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2023-39333, CVE-2024-28182, CVE-2025-23085, CVE-2025-55132, CVE-2026-21714, CVE-2026-21711, CVE-2024-21890, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [direct] (CVE-2025-27614, CVE-2022-39253, CVE-2023-22490, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [direct] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [direct] (CVE-2025-27614, CVE-2022-39253, CVE-2023-22490, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [direct] (CVE-2025-4673, CVE-2024-24790, CVE-2022-27664, CVE-2022-2879, CVE-2022-32189, CVE-2022-41715, CVE-2023-29406, CVE-2024-24785, CVE-2024-9355, CVE-2025-47906, CVE-2023-39318, CVE-2023-39319, CVE-2024-24783, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-24789, CVE-2024-24784, CVE-2025-22871, CVE-2022-41717, CVE-2023-24532, CVE-2023-29409, CVE-2023-39326, CVE-2023-45289, CVE-2023-45290, CVE-2025-22866, CVE-2024-45341), pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2025-22150, CVE-2024-21891, CVE-2022-35256, CVE-2023-23936, CVE-2024-22020, CVE-2024-22025, CVE-2024-28863, CVE-2025-23167, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2023-46809, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2023-39333, CVE-2024-28182, CVE-2025-23085, CVE-2025-55132, CVE-2026-21714, CVE-2026-21711, CVE-2024-21890, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [direct] (CVE-2020-11023), pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm [direct] (CVE-2025-4673, CVE-2024-24790, CVE-2022-27664, CVE-2022-2879, CVE-2022-32189, CVE-2022-41715, CVE-2023-29406, CVE-2024-24785, CVE-2024-9355, CVE-2025-47906, CVE-2023-39318, CVE-2023-39319, CVE-2024-24783, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-24789, CVE-2024-24784, CVE-2025-22871, CVE-2022-41717, CVE-2023-24532, CVE-2023-29409, CVE-2023-39326, CVE-2023-45289, CVE-2023-45290, CVE-2025-22866, CVE-2024-45341), pkg:rpm/redhat/nodejs-docs@16.18.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2025-22150, CVE-2024-21891, CVE-2022-35256, CVE-2023-23936, CVE-2024-22020, CVE-2024-22025, CVE-2024-28863, CVE-2025-23167, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2023-46809, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2023-39333, CVE-2024-28182, CVE-2025-23085, CVE-2025-55132, CVE-2026-21714, CVE-2026-21711, CVE-2024-21890, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [direct] (CVE-2020-11023), pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm [direct] (CVE-2025-4673, CVE-2024-24790, CVE-2022-27664, CVE-2022-2879, CVE-2022-32189, CVE-2022-41715, CVE-2023-29406, CVE-2024-24785, CVE-2024-9355, CVE-2025-47906, CVE-2023-39318, CVE-2023-39319, CVE-2024-24783, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-24789, CVE-2024-24784, CVE-2025-22871, CVE-2022-41717, CVE-2023-24532, CVE-2023-29409, CVE-2023-39326, CVE-2023-45289, CVE-2023-45290, CVE-2025-22866, CVE-2024-45341), pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm [direct] (CVE-2024-7143, CVE-2023-43804, CVE-2024-37891, CVE-2023-45803), pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm [direct] (CVE-2021-3826), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [direct] (CVE-2022-3597, CVE-2022-3598, CVE-2022-3599, CVE-2022-3626, CVE-2022-3627, CVE-2022-40090, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-30774, CVE-2023-30775, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2022-4645, CVE-2022-3570, CVE-2022-48281, CVE-2023-0799, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-30086, CVE-2023-3316, CVE-2023-3576, CVE-2025-61143, CVE-2025-61144, CVE-2025-61145), pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [direct] (CVE-2022-3597, CVE-2022-3598, CVE-2022-3599, CVE-2022-3626, CVE-2022-3627, CVE-2022-40090, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-30774, CVE-2023-30775, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2022-4645, CVE-2022-3570, CVE-2022-48281, CVE-2023-0799, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-30086, CVE-2023-3316, CVE-2023-3576), pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm [direct] (CVE-2023-40403), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [direct] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [direct] (CVE-2019-12900), pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [direct] (CVE-2020-11023), pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm [direct] (CVE-2025-45582), pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm [direct] (CVE-2024-38428), pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [direct] (CVE-2019-12900), pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm [direct] (CVE-2026-34743), pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [direct] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [direct] (CVE-2025-40909), pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [direct] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm [direct] (CVE-2023-43788, CVE-2023-43789), pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [direct] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm [direct] (CVE-2021-3826), pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [direct] (CVE-2021-3903, CVE-2026-28421, CVE-2026-28417, CVE-2025-53905, CVE-2025-53906), pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [direct] (CVE-2025-40909), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [direct] (CVE-2021-3903, CVE-2026-28421, CVE-2026-28417, CVE-2025-53905, CVE-2025-53906), pkg:rpm/redhat/qt5-srpm-macros@5.15.3-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=qt5-5.15.3-1.el9.src.rpm [direct] (CVE-2023-32573, CVE-2023-33285, CVE-2023-34410), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2026-28386, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2026-28386, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-36227, CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/python3-rpm@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lua-5.4.4-2.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-28805), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libsmartcols@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/file-libs@5.39-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=file-5.39-10.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-headers@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-50616, CVE-2024-56614, CVE-2024-56615, CVE-2025-21883, CVE-2025-21928, CVE-2025-21929, CVE-2025-21991, CVE-2025-22085, CVE-2021-47383, CVE-2025-21759, CVE-2023-28746, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2024-21823, CVE-2025-21999, CVE-2024-46695, CVE-2024-50275, CVE-2024-42292, CVE-2024-50302, CVE-2022-49395, CVE-2023-5090, CVE-2024-26664, CVE-2024-50264, CVE-2025-38110, CVE-2024-53122, CVE-2024-53197, CVE-2024-36941, CVE-2024-38627, CVE-2022-50042, CVE-2022-50678, CVE-2023-1074, CVE-2023-45862, CVE-2023-52490, CVE-2023-52658, CVE-2023-53597, CVE-2023-53704, CVE-2023-54004, CVE-2023-54093, CVE-2023-54271, CVE-2023-7192, CVE-2024-0443, CVE-2024-26615, CVE-2024-26878, CVE-2024-27046, CVE-2024-27052, CVE-2024-35789, CVE-2024-35852, CVE-2024-35890, CVE-2024-35907, CVE-2024-35952, CVE-2024-35989, CVE-2024-39483, CVE-2024-40959, CVE-2024-41035, CVE-2024-41064, CVE-2024-42079, CVE-2024-42272, CVE-2024-42283, CVE-2024-42322, CVE-2024-43854, CVE-2024-44990, CVE-2024-44994, CVE-2024-45018, CVE-2024-46713, CVE-2024-46824, CVE-2024-49949, CVE-2024-50208, CVE-2024-50251, CVE-2024-50252, CVE-2024-53113, CVE-2025-21669, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-37785, CVE-2025-38234, CVE-2023-52448, CVE-2023-53755, CVE-2024-47745, CVE-2024-53088, CVE-2025-21961, CVE-2025-22036, CVE-2025-38417, CVE-2023-52771, CVE-2023-52864, CVE-2024-26855, CVE-2024-35845, CVE-2024-36922, CVE-2024-38555, CVE-2024-38556, CVE-2024-43855, CVE-2024-46826, CVE-2024-26897, CVE-2024-38586), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-devel@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/cpp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-B@1.80-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-AutoLoader@5.74-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-FileHandle@2.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-base@2.27-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Digest-1.19-4.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2022-36227, CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/python3-rpm@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lua-5.4.4-2.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2022-28805), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libsmartcols@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/file-libs@5.39-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=file-5.39-10.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/systemd-libs@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2022-36227, CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2022-36227, CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/go-srpm-macros@3.0.9-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=go-rpm-macros-3.0.9-9.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-47906), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/qt5-srpm-macros@5.15.3-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=qt5-5.15.3-1.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-32573, CVE-2023-33285, CVE-2023-34410), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/rpm-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lua-5.4.4-2.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2022-28805), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/file-libs@5.39-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=file-5.39-10.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/file@5.39-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=file-5.39-10.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2026-28386, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/systemd@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-40224, CVE-2026-40225, CVE-2026-40226, CVE-2023-7008, CVE-2026-40227, CVE-2025-4598, CVE-2026-40223), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/libsmartcols@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libfdisk@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/util-linux-core@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/util-linux@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-rpm-macros@250-12.el9_1.3?arch=noarch\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/systemd-libs@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/systemd-pam@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-23865), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/glib2-devel@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2023-29499, CVE-2025-4373), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-22801, CVE-2025-28162, CVE-2025-64506, CVE-2026-22695, CVE-2026-3713, CVE-2025-28164, CVE-2025-64505), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-22693), pkg:rpm/redhat/libpng-devel@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-22801, CVE-2026-22695), pkg:rpm/redhat/libblkid-devel@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount-devel@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/nodejs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-22150, CVE-2024-21891, CVE-2022-35256, CVE-2023-23936, CVE-2024-22020, CVE-2024-22025, CVE-2024-28863, CVE-2025-23167, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2023-46809, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2023-39333, CVE-2024-28182, CVE-2025-23085, CVE-2025-55132, CVE-2026-21714, CVE-2026-21711, CVE-2024-21890, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2026-28386, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/nodejs-libs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-22150, CVE-2023-23936, CVE-2024-22025, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2024-28182, CVE-2025-23085, CVE-2026-21714, CVE-2026-21711, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2021-3903, CVE-2026-28421, CVE-2026-28417, CVE-2025-53905, CVE-2025-53906), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2026-28386, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssh-clients@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-26465, CVE-2023-25136, CVE-2023-51385, CVE-2023-48795, CVE-2025-61984, CVE-2025-61985, CVE-2025-32728), pkg:rpm/redhat/openssh@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-26465, CVE-2023-25136, CVE-2023-51385, CVE-2023-48795, CVE-2025-61984, CVE-2025-61985, CVE-2025-32728), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libfdisk@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/util-linux-core@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/util-linux@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2026-28386, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssh@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-26465, CVE-2023-25136, CVE-2023-51385, CVE-2023-48795, CVE-2025-61984, CVE-2025-61985, CVE-2025-32728), pkg:rpm/redhat/openssh-clients@8.7p1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=openssh-8.7p1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-26465, CVE-2023-25136, CVE-2023-51385, CVE-2023-48795, CVE-2025-61984, CVE-2025-61985, CVE-2025-32728), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-27614, CVE-2022-39253, CVE-2023-22490, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/perl-Git@2.31.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-27614, CVE-2022-39253, CVE-2023-22490, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/git-core-doc@2.31.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-27614, CVE-2022-39253, CVE-2023-22490, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-27614, CVE-2022-39253, CVE-2023-22490, CVE-2024-52006, CVE-2025-27613), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/emacs-filesystem@27.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=emacs-27.2-6.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-30203, CVE-2024-30204), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Find@1.37-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-DynaLoader@1.47-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/util-linux-core@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libsmartcols@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libfdisk@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/util-linux@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2026-28386, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-36227, CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/systemd@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-40224, CVE-2026-40225, CVE-2026-40226, CVE-2023-7008, CVE-2026-40227, CVE-2025-4598, CVE-2026-40223), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/python3-rpm@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/python3-decorator@4.4.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-decorator-4.4.2-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2727, CVE-2023-2728), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/libeconf@0.4.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libeconf-0.4.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-22652), pkg:rpm/redhat/rpm@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lua-5.4.4-2.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-28805), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/dbus-libs@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/dbus-common@1.12.20-7.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-34969), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/util-linux-core@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/python3-requests@2.25.1-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-requests-2.25.1-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-32681, CVE-2024-35195, CVE-2024-47081), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libsmartcols@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libfdisk@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/util-linux@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-rpm-macros@250-12.el9_1.3?arch=noarch\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/systemd-pam@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/systemd-libs@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/file-libs@5.39-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=file-5.39-10.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-4673, CVE-2024-24790, CVE-2022-27664, CVE-2022-2879, CVE-2022-32189, CVE-2022-41715, CVE-2023-29406, CVE-2024-24785, CVE-2024-9355, CVE-2025-47906, CVE-2023-39318, CVE-2023-39319, CVE-2024-24783, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-24789, CVE-2024-24784, CVE-2025-22871, CVE-2022-41717, CVE-2023-24532, CVE-2023-29409, CVE-2023-39326, CVE-2023-45289, CVE-2023-45290, CVE-2025-22866, CVE-2024-45341), pkg:rpm/redhat/golang-src@1.18.9-1.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-4673, CVE-2024-24790, CVE-2022-27664, CVE-2022-2879, CVE-2022-32189, CVE-2022-41715, CVE-2023-29406, CVE-2024-24785, CVE-2024-9355, CVE-2025-47906, CVE-2023-39318, CVE-2023-39319, CVE-2024-24783, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-24789, CVE-2024-24784, CVE-2025-22871, CVE-2022-41717, CVE-2023-24532, CVE-2023-29409, CVE-2023-39326, CVE-2023-45289, CVE-2023-45290, CVE-2025-22866, CVE-2024-45341), pkg:rpm/redhat/golang-bin@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-4673, CVE-2024-24790, CVE-2022-27664, CVE-2022-2879, CVE-2022-32189, CVE-2022-41715, CVE-2023-29406, CVE-2024-24785, CVE-2024-9355, CVE-2025-47906, CVE-2023-39318, CVE-2023-39319, CVE-2024-24783, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-24789, CVE-2024-24784, CVE-2025-22871, CVE-2022-41717, CVE-2023-24532, CVE-2023-29409, CVE-2023-39326, CVE-2023-45289, CVE-2023-45290, CVE-2025-22866, CVE-2024-45341), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-headers@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2022-50616, CVE-2024-56614, CVE-2024-56615, CVE-2025-21883, CVE-2025-21928, CVE-2025-21929, CVE-2025-21991, CVE-2025-22085, CVE-2021-47383, CVE-2025-21759, CVE-2023-28746, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2024-21823, CVE-2025-21999, CVE-2024-46695, CVE-2024-50275, CVE-2024-42292, CVE-2024-50302, CVE-2022-49395, CVE-2023-5090, CVE-2024-26664, CVE-2024-50264, CVE-2025-38110, CVE-2024-53122, CVE-2024-53197, CVE-2024-36941, CVE-2024-38627, CVE-2022-50042, CVE-2022-50678, CVE-2023-1074, CVE-2023-45862, CVE-2023-52490, CVE-2023-52658, CVE-2023-53597, CVE-2023-53704, CVE-2023-54004, CVE-2023-54093, CVE-2023-54271, CVE-2023-7192, CVE-2024-0443, CVE-2024-26615, CVE-2024-26878, CVE-2024-27046, CVE-2024-27052, CVE-2024-35789, CVE-2024-35852, CVE-2024-35890, CVE-2024-35907, CVE-2024-35952, CVE-2024-35989, CVE-2024-39483, CVE-2024-40959, CVE-2024-41035, CVE-2024-41064, CVE-2024-42079, CVE-2024-42272, CVE-2024-42283, CVE-2024-42322, CVE-2024-43854, CVE-2024-44990, CVE-2024-44994, CVE-2024-45018, CVE-2024-46713, CVE-2024-46824, CVE-2024-49949, CVE-2024-50208, CVE-2024-50251, CVE-2024-50252, CVE-2024-53113, CVE-2025-21669, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-37785, CVE-2025-38234, CVE-2023-52448, CVE-2023-53755, CVE-2024-47745, CVE-2024-53088, CVE-2025-21961, CVE-2025-22036, CVE-2025-38417, CVE-2023-52771, CVE-2023-52864, CVE-2024-26855, CVE-2024-35845, CVE-2024-36922, CVE-2024-38555, CVE-2024-38556, CVE-2024-43855, CVE-2024-46826, CVE-2024-26897, CVE-2024-38586), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-devel@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/cpp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/nodejs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-22150, CVE-2024-21891, CVE-2022-35256, CVE-2023-23936, CVE-2024-22020, CVE-2024-22025, CVE-2024-28863, CVE-2025-23167, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2023-46809, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2023-39333, CVE-2024-28182, CVE-2025-23085, CVE-2025-55132, CVE-2026-21714, CVE-2026-21711, CVE-2024-21890, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2025-9231, CVE-2026-22796, CVE-2026-28388, CVE-2026-28389, CVE-2026-31790, CVE-2026-31789, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2026-28386, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/nodejs-libs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-22150, CVE-2023-23936, CVE-2024-22025, CVE-2026-1527, CVE-2026-21712, CVE-2026-25547, CVE-2026-26996, CVE-2026-27904, CVE-2024-27982, CVE-2023-31147, CVE-2025-59466, CVE-2026-21637, CVE-2026-21713, CVE-2026-21717, CVE-2026-2581, CVE-2023-31130, CVE-2023-30588, CVE-2024-28182, CVE-2025-23085, CVE-2026-21714, CVE-2026-21711, CVE-2024-25629, CVE-2023-23920), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-3597, CVE-2022-3598, CVE-2022-3599, CVE-2022-3626, CVE-2022-3627, CVE-2022-40090, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-30774, CVE-2023-30775, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2022-4645, CVE-2022-3570, CVE-2022-48281, CVE-2023-0799, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-30086, CVE-2023-3316, CVE-2023-3576), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-3597, CVE-2022-3598, CVE-2022-3599, CVE-2022-3626, CVE-2022-3627, CVE-2022-40090, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-30774, CVE-2023-30775, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2022-4645, CVE-2022-3570, CVE-2022-48281, CVE-2023-0799, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-30086, CVE-2023-3316, CVE-2023-3576, CVE-2025-61143, CVE-2025-61144, CVE-2025-61145), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-23865), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libX11-xcb@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libX11-devel@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/glib2-devel@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2023-29499, CVE-2025-4373), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-22801, CVE-2025-28162, CVE-2025-64506, CVE-2026-22695, CVE-2026-3713, CVE-2025-28164, CVE-2025-64505), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-22693), pkg:rpm/redhat/libjpeg-turbo-devel@2.0.90-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libjpeg-turbo-2.0.90-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2021-46822), pkg:rpm/redhat/libpng-devel@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-22801, CVE-2026-22695), pkg:rpm/redhat/libjpeg-turbo@2.0.90-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libjpeg-turbo-2.0.90-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2021-46822), pkg:rpm/redhat/libblkid-devel@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount-devel@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/libXpm@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43788, CVE-2023-43789), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43788, CVE-2023-43789), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2022-36227, CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2021-3903, CVE-2026-28421, CVE-2026-28417, CVE-2025-53905, CVE-2025-53906), pkg:rpm/redhat/rpm-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lua-5.4.4-2.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2022-28805), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/systemd-libs@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-7008, CVE-2025-4598), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-headers@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-50616, CVE-2024-56614, CVE-2024-56615, CVE-2025-21883, CVE-2025-21928, CVE-2025-21929, CVE-2025-21991, CVE-2025-22085, CVE-2021-47383, CVE-2025-21759, CVE-2023-28746, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2024-21823, CVE-2025-21999, CVE-2024-46695, CVE-2024-50275, CVE-2024-42292, CVE-2024-50302, CVE-2022-49395, CVE-2023-5090, CVE-2024-26664, CVE-2024-50264, CVE-2025-38110, CVE-2024-53122, CVE-2024-53197, CVE-2024-36941, CVE-2024-38627, CVE-2022-50042, CVE-2022-50678, CVE-2023-1074, CVE-2023-45862, CVE-2023-52490, CVE-2023-52658, CVE-2023-53597, CVE-2023-53704, CVE-2023-54004, CVE-2023-54093, CVE-2023-54271, CVE-2023-7192, CVE-2024-0443, CVE-2024-26615, CVE-2024-26878, CVE-2024-27046, CVE-2024-27052, CVE-2024-35789, CVE-2024-35852, CVE-2024-35890, CVE-2024-35907, CVE-2024-35952, CVE-2024-35989, CVE-2024-39483, CVE-2024-40959, CVE-2024-41035, CVE-2024-41064, CVE-2024-42079, CVE-2024-42272, CVE-2024-42283, CVE-2024-42322, CVE-2024-43854, CVE-2024-44990, CVE-2024-44994, CVE-2024-45018, CVE-2024-46713, CVE-2024-46824, CVE-2024-49949, CVE-2024-50208, CVE-2024-50251, CVE-2024-50252, CVE-2024-53113, CVE-2025-21669, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-37785, CVE-2025-38234, CVE-2023-52448, CVE-2023-53755, CVE-2024-47745, CVE-2024-53088, CVE-2025-21961, CVE-2025-22036, CVE-2025-38417, CVE-2023-52771, CVE-2023-52864, CVE-2024-26855, CVE-2024-35845, CVE-2024-36922, CVE-2024-38555, CVE-2024-38556, CVE-2024-43855, CVE-2024-46826, CVE-2024-26897, CVE-2024-38586), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-devel@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/cpp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcomps-0.1.18-1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.3.3-2.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnupg2-2.3.3-2.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-68972), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/libarchive@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2022-36227, CVE-2025-60753, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libgcrypt@1.10.0-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgcrypt-1.10.0-8.el9_0.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/python3-rpm@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-sign-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-libs@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.16.1.3-19.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rpm-4.16.1.3-19.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@3.0.3-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=tpm2-tss-3.0.3-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lua-5.4.4-2.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2022-28805), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libsmartcols@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/file-libs@5.39-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=file-5.39-10.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-headers@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-50616, CVE-2024-56614, CVE-2024-56615, CVE-2025-21883, CVE-2025-21928, CVE-2025-21929, CVE-2025-21991, CVE-2025-22085, CVE-2021-47383, CVE-2025-21759, CVE-2023-28746, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2024-21823, CVE-2025-21999, CVE-2024-46695, CVE-2024-50275, CVE-2024-42292, CVE-2024-50302, CVE-2022-49395, CVE-2023-5090, CVE-2024-26664, CVE-2024-50264, CVE-2025-38110, CVE-2024-53122, CVE-2024-53197, CVE-2024-36941, CVE-2024-38627, CVE-2022-50042, CVE-2022-50678, CVE-2023-1074, CVE-2023-45862, CVE-2023-52490, CVE-2023-52658, CVE-2023-53597, CVE-2023-53704, CVE-2023-54004, CVE-2023-54093, CVE-2023-54271, CVE-2023-7192, CVE-2024-0443, CVE-2024-26615, CVE-2024-26878, CVE-2024-27046, CVE-2024-27052, CVE-2024-35789, CVE-2024-35852, CVE-2024-35890, CVE-2024-35907, CVE-2024-35952, CVE-2024-35989, CVE-2024-39483, CVE-2024-40959, CVE-2024-41035, CVE-2024-41064, CVE-2024-42079, CVE-2024-42272, CVE-2024-42283, CVE-2024-42322, CVE-2024-43854, CVE-2024-44990, CVE-2024-44994, CVE-2024-45018, CVE-2024-46713, CVE-2024-46824, CVE-2024-49949, CVE-2024-50208, CVE-2024-50251, CVE-2024-50252, CVE-2024-53113, CVE-2025-21669, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-37785, CVE-2025-38234, CVE-2023-52448, CVE-2023-53755, CVE-2024-47745, CVE-2024-53088, CVE-2025-21961, CVE-2025-22036, CVE-2025-38417, CVE-2023-52771, CVE-2023-52864, CVE-2024-26855, CVE-2024-35845, CVE-2024-36922, CVE-2024-38555, CVE-2024-38556, CVE-2024-43855, CVE-2024-46826, CVE-2024-26897, CVE-2024-38586), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-devel@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/cpp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/delve@1.8.3-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=delve-1.8.3-1.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-4673, CVE-2024-24790, CVE-2022-27664, CVE-2022-2879, CVE-2022-32189, CVE-2022-41715, CVE-2023-29406, CVE-2024-24785, CVE-2024-9355, CVE-2025-47906, CVE-2023-39318, CVE-2023-39319, CVE-2024-24783, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-24789, CVE-2024-24784, CVE-2025-22871, CVE-2022-41717, CVE-2023-24532, CVE-2023-29409, CVE-2023-39326, CVE-2023-45289, CVE-2023-45290, CVE-2025-22866, CVE-2024-45341), pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-4673, CVE-2024-24790, CVE-2022-27664, CVE-2022-2879, CVE-2022-32189, CVE-2022-41715, CVE-2023-29406, CVE-2024-24785, CVE-2024-9355, CVE-2025-47906, CVE-2023-39318, CVE-2023-39319, CVE-2024-24783, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-24789, CVE-2024-24784, CVE-2025-22871, CVE-2022-41717, CVE-2023-24532, CVE-2023-29409, CVE-2023-39326, CVE-2023-45289, CVE-2023-45290, CVE-2025-22866, CVE-2024-45341), pkg:rpm/redhat/golang-src@1.18.9-1.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-4673, CVE-2024-24790, CVE-2022-27664, CVE-2022-2879, CVE-2022-32189, CVE-2022-41715, CVE-2023-29406, CVE-2024-24785, CVE-2024-9355, CVE-2025-47906, CVE-2023-39318, CVE-2023-39319, CVE-2024-24783, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-24789, CVE-2024-24784, CVE-2025-22871, CVE-2022-41717, CVE-2023-24532, CVE-2023-29409, CVE-2023-39326, CVE-2023-45289, CVE-2023-45290, CVE-2025-22866, CVE-2024-45341), pkg:rpm/redhat/golang-bin@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-4673, CVE-2024-24790, CVE-2022-27664, CVE-2022-2879, CVE-2022-32189, CVE-2022-41715, CVE-2023-29406, CVE-2024-24785, CVE-2024-9355, CVE-2025-47906, CVE-2023-39318, CVE-2023-39319, CVE-2024-24783, CVE-2024-24791, CVE-2024-34155, CVE-2024-34158, CVE-2024-45336, CVE-2024-24789, CVE-2024-24784, CVE-2025-22871, CVE-2022-41717, CVE-2023-24532, CVE-2023-29409, CVE-2023-39326, CVE-2023-45289, CVE-2023-45290, CVE-2025-22866, CVE-2024-45341), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-headers@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2022-50616, CVE-2024-56614, CVE-2024-56615, CVE-2025-21883, CVE-2025-21928, CVE-2025-21929, CVE-2025-21991, CVE-2025-22085, CVE-2021-47383, CVE-2025-21759, CVE-2023-28746, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2024-21823, CVE-2025-21999, CVE-2024-46695, CVE-2024-50275, CVE-2024-42292, CVE-2024-50302, CVE-2022-49395, CVE-2023-5090, CVE-2024-26664, CVE-2024-50264, CVE-2025-38110, CVE-2024-53122, CVE-2024-53197, CVE-2024-36941, CVE-2024-38627, CVE-2022-50042, CVE-2022-50678, CVE-2023-1074, CVE-2023-45862, CVE-2023-52490, CVE-2023-52658, CVE-2023-53597, CVE-2023-53704, CVE-2023-54004, CVE-2023-54093, CVE-2023-54271, CVE-2023-7192, CVE-2024-0443, CVE-2024-26615, CVE-2024-26878, CVE-2024-27046, CVE-2024-27052, CVE-2024-35789, CVE-2024-35852, CVE-2024-35890, CVE-2024-35907, CVE-2024-35952, CVE-2024-35989, CVE-2024-39483, CVE-2024-40959, CVE-2024-41035, CVE-2024-41064, CVE-2024-42079, CVE-2024-42272, CVE-2024-42283, CVE-2024-42322, CVE-2024-43854, CVE-2024-44990, CVE-2024-44994, CVE-2024-45018, CVE-2024-46713, CVE-2024-46824, CVE-2024-49949, CVE-2024-50208, CVE-2024-50251, CVE-2024-50252, CVE-2024-53113, CVE-2025-21669, CVE-2025-21962, CVE-2025-21963, CVE-2025-21964, CVE-2025-37785, CVE-2025-38234, CVE-2023-52448, CVE-2023-53755, CVE-2024-47745, CVE-2024-53088, CVE-2025-21961, CVE-2025-22036, CVE-2025-38417, CVE-2023-52771, CVE-2023-52864, CVE-2024-26855, CVE-2024-35845, CVE-2024-36922, CVE-2024-38555, CVE-2024-38556, CVE-2024-43855, CVE-2024-46826, CVE-2024-26897, CVE-2024-38586), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-devel@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libgomp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/cpp@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2022-4285, CVE-2025-11081, CVE-2025-11082, CVE-2025-11083, CVE-2025-11413, CVE-2025-5244), pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2022-4285, CVE-2025-11082, CVE-2025-11083, CVE-2025-5244), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2026-5713, CVE-2025-13837, CVE-2026-4224, CVE-2007-4559, CVE-2026-3644, CVE-2023-27043, CVE-2024-8088, CVE-2025-12781, CVE-2026-3446, CVE-2024-0397, CVE-2024-7592, CVE-2025-15282, CVE-2025-11468, CVE-2026-0865, CVE-2026-1502, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/python3-idna@2.10-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-idna-2.10-7.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-3651), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.19.1-24.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=krb5-1.19.1-24.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2023-46218, CVE-2025-9086, CVE-2023-27533), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/libnghttp2@1.43.0-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=nghttp2-1.43.0-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/expat@2.4.9-1.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=expat-2.4.9-1.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-23990, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2021-3826), pkg:rpm/redhat/gmp@6.2.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=gmp-6.2.0-10.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/python3-pip-wheel@21.2.3-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-pip-21.2.3-6.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libjpeg-turbo@2.0.90-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libjpeg-turbo-2.0.90-5.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2021-46822), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-3597, CVE-2022-3598, CVE-2022-3599, CVE-2022-3626, CVE-2022-3627, CVE-2022-40090, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-30774, CVE-2023-30775, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2022-4645, CVE-2022-3570, CVE-2022-48281, CVE-2023-0799, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-30086, CVE-2023-3316, CVE-2023-3576, CVE-2025-61143, CVE-2025-61144, CVE-2025-61145), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/freetype@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-23865), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/libpng@1.6.37-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=libpng-1.6.37-12.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-22801, CVE-2025-28162, CVE-2025-64506, CVE-2026-22695, CVE-2026-3713, CVE-2025-28164, CVE-2025-64505), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/harfbuzz@2.7.4-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=harfbuzz-2.7.4-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-22693), pkg:rpm/redhat/libjpeg-turbo@2.0.90-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libjpeg-turbo-2.0.90-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2021-46822), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/libXpm@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-43788, CVE-2023-43789), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2022-3597, CVE-2022-3598, CVE-2022-3599, CVE-2022-3626, CVE-2022-3627, CVE-2022-40090, CVE-2023-3618, CVE-2023-40745, CVE-2023-41175, CVE-2023-30774, CVE-2023-30775, CVE-2023-0795, CVE-2023-0796, CVE-2023-0797, CVE-2023-0798, CVE-2023-0800, CVE-2023-0801, CVE-2023-0802, CVE-2023-0803, CVE-2023-0804, CVE-2022-4645, CVE-2022-3570, CVE-2022-48281, CVE-2023-0799, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-30086, CVE-2023-3316, CVE-2023-3576, CVE-2025-61143, CVE-2025-61144, CVE-2025-61145), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libjpeg-turbo@2.0.90-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libjpeg-turbo-2.0.90-5.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2021-46822), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libxslt@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2023-40403), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-FileHandle@2.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-base@2.27-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Digest@1.19-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Digest-1.19-4.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-libnet@3.13-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-libnet-3.13-4.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2-devel@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libstdc%2B%2B-devel@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/kernel-srpm-macros@1.0-11.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=kernel-srpm-macros-1.0-11.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/emacs-filesystem@27.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=emacs-27.2-6.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2024-30203, CVE-2024-30204), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-B@1.80-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Find@1.37-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Compare@1.100.600-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-DynaLoader@1.47-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/automake@1.16.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=automake-1.16.2-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/json-c@0.14-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=json-c-0.14-11.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/tar@1.34-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=tar-1.34-6.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libselinux-devel@3.4-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libselinux-3.4-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/ed@1.14.2-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ed-1.14.2-12.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/wget@1.21.1-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=wget-1.21.1-7.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/bzip2@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/xz@5.2.5-8.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=xz-5.2.5-8.el9_0.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libgpg-error-devel@1.42-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libgpg-error-1.42-5.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-lib@0.65-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/patch@2.7.6-16.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=patch-2.7.6-16.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/brotli@1.0.9-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=brotli-1.0.9-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/m4@1.4.19-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=m4-1.4.19-1.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libipt@2.0.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libipt-2.0.4-5.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/pcre-utf32@8.44-3.el9.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pcre-8.44-3.el9.3.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-gconv-extra@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/boost-regex@1.75.0-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=boost-1.75.0-8.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libX11-common@1.7.0-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libX11@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libX11-devel@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libX11-xcb@1.7.0-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libX11-1.7.0-7.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43785, CVE-2023-43786), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libXpm@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libXpm-devel@3.5.13-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libXpm-3.5.13-8.el9_1.src.rpm] (CVE-2023-43788, CVE-2023-43789), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libpsl@0.21.1-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpsl-0.21.1-5.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Error@0.17029-7.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Error-0.17029-7.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/annobin@10.73-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=annobin-10.73-3.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/dmidecode@3.3-7.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dmidecode-3.3-7.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/glibc-locale-source@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/emacs-filesystem@27.2-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=emacs-27.2-6.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2024-30203, CVE-2024-30204), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-B@1.80-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Copy@2.34-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Find@1.37-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Compare@1.100.600-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-DynaLoader@1.47-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/autoconf@2.69-38.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=autoconf-2.69-38.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-31.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=rootfiles-8.1-31.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/gnutls@3.7.6-12.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gnutls-3.7.6-12.el9_0.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libuuid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libmount@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.16.0-8.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtasn1-4.16.0-8.el9_1.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.24.1-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=p11-kit-0.24.1-2.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.8-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=bzip2-1.0.8-8.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=vim-8.2.2637-20.el9_1.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-langpack-en@2.34-40.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glibc-2.34-40.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/perl-HTTP-Tiny@0.076-460.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-HTTP-Tiny-0.076-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/ncurses-base@6.2-8.20210508.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.2-8.20210508.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=ncurses-6.2-8.20210508.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/perl-Fcntl@1.13-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IPC-Open3@1.21-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-interpreter@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-vars@1.05-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-SelectSaver@1.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-if@0.60.800-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-POSIX@1.94-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Symbol@1.08-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Class-Struct@0.66-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-subs@1.03-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Errno@1.30-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-stat@1.09-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-libs@5.32.1-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=4\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overloading@0.02-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-IO@1.43-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-overload@1.31-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Getopt-Std@1.12-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-File-Basename@2.85-479.el9?arch=noarch\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-mro@1.23-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-constant@1.33-461.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-constant-1.33-461.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2025-40909), pkg:rpm/redhat/perl-Storable@3.21-460.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=perl-Storable-3.21-460.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2017-20230), pkg:rpm/redhat/libgcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm [transitive via pkg:rpm/redhat/perl-NDBM_File@1.15-479.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=0\u0026upstream=perl-5.32.1-479.el9.src.rpm] (CVE-2020-11023)", "name": "rhtpa_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 404 } }, { "msg": "Found 66 low vulnerabilities.", "metadata": { "details": { "description": "Source: osv-github. Affected dependencies: pkg:npm/brace-expansion@1.1.11 [direct] (CVE-2025-5889), pkg:npm/brace-expansion@2.0.1 [direct] (CVE-2025-5889), pkg:npm/%40tootallnate/once@2.0.0 [direct] (CVE-2026-3449); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm [direct] (CVE-2023-4016), pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2023-45143, CVE-2024-36137, CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2021-44906, CVE-2024-22018), pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [direct] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835, CVE-2023-25815), pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [direct] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [direct] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835, CVE-2023-25815), pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2023-45143, CVE-2024-36137, CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2021-44906, CVE-2024-22018), pkg:rpm/redhat/nodejs-docs@16.18.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [direct] (CVE-2023-45143, CVE-2024-36137, CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2021-44906, CVE-2024-22018), pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm [direct] (CVE-2022-41862), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [direct] (CVE-2023-6228), pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [direct] (CVE-2023-6228), pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [direct] (CVE-2025-70873), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/binutils-gold@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/pam@1.5.1-12.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pam-1.5.1-12.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libuser@0.63-11.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libuser-0.63-11.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/libdnf-plugin-subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-50846, CVE-2023-53639, CVE-2023-54153, CVE-2023-54267), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/gcc@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-IO-Socket-SSL@2.073-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-IO-Socket-SSL-2.073-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugins-core@4.1.0-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-plugins-core-4.1.0-3.el9.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/rsync@3.2.3-18.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=rsync-3.2.3-18.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-six@1.15.0-9.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-six-1.15.0-9.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/bsdtar@3.5.3-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libarchive-3.5.3-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/redhat-rpm-config@196-1.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=redhat-rpm-config-196-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/systemd@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-40228), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/util-linux@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/dbus@1.12.20-7.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=dbus-1.12.20-7.el9_1.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb-headless@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/glib2-devel@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/freetype-devel@2.10.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=freetype-2.10.4-9.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/mariadb-connector-c-devel@3.2.6-1.el9_0?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=mariadb-connector-c-3.2.6-1.el9_0.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/nodejs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-45143, CVE-2024-36137, CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2021-44906, CVE-2024-22018), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/nodejs-libs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2025-55132), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/npm@8.19.2-1.16.18.1.3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm [transitive via pkg:rpm/redhat/environment-modules@5.0.1-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=environment-modules-5.0.1-1.el9.src.rpm] (CVE-2023-4016), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/python3-gobject-base@3.40.1-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=pygobject3-3.40.1-6.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/lsof@4.94.0-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=lsof-4.94.0-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/util-linux@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libcurl-devel@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-setuptools@53.0.0-10.el9_1.1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-setuptools-53.0.0-10.el9_1.1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-chardet@4.0.0-5.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-chardet-4.0.0-5.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20220815-1.git0fbe86f.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=crypto-policies-20220815-1.git0fbe86f.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835, CVE-2023-25815), pkg:rpm/redhat/perl-Git@2.31.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835, CVE-2023-25815), pkg:rpm/redhat/git-core-doc@2.31.1-3.el9_1?arch=noarch\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835, CVE-2023-25815), pkg:rpm/redhat/git-core@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-32020, CVE-2024-32021, CVE-2024-50349, CVE-2025-46835, CVE-2023-25815), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/util-linux@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/git@2.31.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=git-2.31.1-3.el9_1.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/systemd@250-12.el9_1.3?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=systemd-250-12.el9_1.3.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-40228), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/util-linux@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.29.30.1-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=subscription-manager-1.29.30.1-1.el9_1.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2022-50846, CVE-2023-53639, CVE-2023-54153, CVE-2023-54267), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/golang@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=golang-1.18.9-1.el9_1.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646), pkg:rpm/redhat/nodejs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-45143, CVE-2024-36137, CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2021-44906, CVE-2024-22018), pkg:rpm/redhat/openssl@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2511, CVE-2026-28387, CVE-2025-9232, CVE-2026-2673), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/nodejs-libs@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2026-21716, CVE-2023-31124, CVE-2025-23165, CVE-2026-21715, CVE-2025-55132), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/nodejs-full-i18n@16.18.1-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=nodejs-16.18.1-3.el9_1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-6228), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-6228), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/glib2-devel@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd-devel@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/procps-ng@3.3.17-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=procps-ng-3.3.17-8.el9.src.rpm [transitive via pkg:rpm/redhat/scl-utils@2.0.3-2.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=scl-utils-2.0.3-2.el9.src.rpm] (CVE-2023-4016), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-50846, CVE-2023-53639, CVE-2023-54153, CVE-2023-54267), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-c%2B%2B@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/curl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/shadow-utils@4.9-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=2\u0026upstream=shadow-utils-4.9-5.el9.src.rpm [transitive via pkg:rpm/redhat/yum@4.12.0-4.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=dnf-4.12.0-4.el9.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2022-50846, CVE-2023-53639, CVE-2023-54153, CVE-2023-54267), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/gcc-plugin-annobin@11.3.1-2.1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gcc-11.3.1-2.1.el9.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646), pkg:rpm/redhat/openssl-devel@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/kernel-headers@5.14.0-162.18.1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=kernel-5.14.0-162.18.1.el9_1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2022-50846, CVE-2023-53639, CVE-2023-54153, CVE-2023-54267), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/binutils@2.35.2-24.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=binutils-2.35.2-24.el9.src.rpm [transitive via pkg:rpm/redhat/go-toolset@1.18.9-1.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=go-toolset-1.18.9-1.el9_1.src.rpm] (CVE-2025-11412, CVE-2025-11414, CVE-2025-11494, CVE-2025-11495, CVE-2025-11839, CVE-2025-11840, CVE-2025-66861, CVE-2025-66862, CVE-2025-66863, CVE-2025-66864, CVE-2025-66865, CVE-2025-66866, CVE-2025-69647, CVE-2025-69648, CVE-2025-69650, CVE-2025-69652, CVE-2025-69645, CVE-2025-69646), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/python3@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2026-2297, CVE-2026-3479, CVE-2024-5642, CVE-2025-13462), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=python-urllib3-1.26.5-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libpq@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2022-41862), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libpq-devel@13.5-1.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libpq-13.5-1.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@3.0.1-47.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026epoch=1\u0026upstream=openssl-3.0.1-47.el9_1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.9.14-1.el9_1.2?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=python3.9-3.9.14-1.el9_1.2.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcurl-minimal@7.76.1-19.el9_1.1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=curl-7.76.1-19.el9_1.1.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gdb@10.2-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gdb-10.2-10.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-6228), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gd@2.3.2-3.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gd-2.3.2-3.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libtiff@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm [transitive via pkg:rpm/redhat/libtiff-devel@4.4.0-5.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libtiff-4.4.0-5.el9_1.src.rpm] (CVE-2023-6228), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxslt-devel@1.1.34-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxslt-1.1.34-9.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/xml-common@0.6.3-58.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=sgml-common-0.6.3-58.el9.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/perl-Mozilla-CA@20200520-6.el9?arch=noarch\u0026distro=rhel-9.1\u0026upstream=perl-Mozilla-CA-20200520-6.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libxml2@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm [transitive via pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libxml2-2.9.13-3.el9_1.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/gobject-introspection@1.68.0-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=gobject-introspection-1.68.0-10.el9.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/man-db@2.9.3-6.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=man-db-2.9.3-6.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/sqlite@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm [transitive via pkg:rpm/redhat/sqlite-devel@3.34.1-6.el9_1?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=sqlite-3.34.1-6.el9_1.src.rpm] (CVE-2025-70873), pkg:rpm/redhat/libcap@2.48-8.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=libcap-2.48-8.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.68.4-5.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=glib2-2.68.4-5.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libblkid@2.37.4-9.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=util-linux-2.37.4-9.el9.src.rpm [transitive via pkg:rpm/redhat/libbabeltrace@1.5.8-10.el9?arch=x86_64\u0026distro=rhel-9.1\u0026upstream=babeltrace-1.5.8-10.el9.src.rpm] (CVE-2026-3184)", "name": "rhtpa_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 66 } } ] } ] {"vulnerabilities":{"critical":12,"high":302,"medium":404,"low":66,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":0,"medium":0,"low":0,"unknown":0}} {"image": {"pullspec": "quay.io/redhat-appstudio-qe/build-e2e-hlye/go-component-sehalr:on-pr-bfcad58f87e04575e0ad1d5b104a4555e8aa4bac", "digests": ["sha256:5c3fe3ab789239fd830d93f82cce9a3b21ff8dd8ab5dd2dc0b1ec7903ff4602e"]}} {"result":"SUCCESS","timestamp":"2026-04-27T23:20:55+00:00","note":"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.","namespace":"default","successes":0,"failures":0,"warnings":0}