Running clair-action on amd64 image manifest... 2026-02-16T12:07:00Z INF matchers created component=libvuln/New matchers=[{"docs":"https://pkg.go.dev/github.com/quay/claircore/debian","name":"debian-matcher"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/gobin","name":"gobin"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/python","name":"python"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/ruby","name":"ruby-gem"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/rhel","name":"rhel"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/alpine","name":"alpine-matcher"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/java","name":"java-maven"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/oracle","name":"oracle"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/aws","name":"aws-matcher"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/photon","name":"photon"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/rhel/rhcc","name":"rhel-container-matcher"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/suse","name":"suse"},{"docs":"https://pkg.go.dev/github.com/quay/claircore/ubuntu","name":"ubuntu-matcher"}] 2026-02-16T12:07:00Z INF libvuln initialized component=libvuln/New 2026-02-16T12:07:01Z INF registered configured scanners component=libindex/New 2026-02-16T12:07:01Z INF NewLayerScanner: constructing a new layer-scanner component=indexer.NewLayerScanner 2026-02-16T12:07:01Z INF index request start component=libindex/Libindex.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb 2026-02-16T12:07:01Z INF starting scan component=indexer/controller/Controller.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb 2026-02-16T12:07:01Z INF manifest to be scanned component=indexer/controller/Controller.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb state=CheckManifest 2026-02-16T12:07:01Z INF layers fetch start component=indexer/controller/Controller.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb state=FetchLayers 2026-02-16T12:07:05Z INF layers fetch success component=indexer/controller/Controller.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb state=FetchLayers 2026-02-16T12:07:05Z INF layers fetch done component=indexer/controller/Controller.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb state=FetchLayers 2026-02-16T12:07:05Z INF layers scan start component=indexer/controller/Controller.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb state=ScanLayers 2026-02-16T12:07:07Z INF layers scan done component=indexer/controller/Controller.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb state=ScanLayers 2026-02-16T12:07:07Z INF starting index manifest component=indexer/controller/Controller.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb state=IndexManifest 2026-02-16T12:07:07Z INF finishing scan component=indexer/controller/Controller.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb state=IndexFinished 2026-02-16T12:07:07Z INF manifest successfully scanned component=indexer/controller/Controller.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb state=IndexFinished 2026-02-16T12:07:07Z INF index request done component=libindex/Libindex.Index manifest=sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb { "manifest_hash": "sha256:f3f0716c45596ef8a89bbeddb9d036e2c706e64e9f57187003a8cd972517f4eb", "packages": { "+A7/nzEXX3Q/xJZ50VMnlQ==": { "id": "+A7/nzEXX3Q/xJZ50VMnlQ==", "name": "libidn2", "version": "2.3.0-7.el9", "kind": "binary", "source": { "id": "", "name": "libidn2", "version": "2.3.0-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "+B22ALb6YCnXu+3s6afaLg==": { "id": "+B22ALb6YCnXu+3s6afaLg==", "name": "python3-decorator", "version": "4.4.2-6.el9", "kind": "binary", "source": { "id": "", "name": "python-decorator", "version": "4.4.2-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "+ELGclZlzVhkDoWJwZc9OA==": { "id": "+ELGclZlzVhkDoWJwZc9OA==", "name": "libtirpc", "version": "1.3.3-9.el9", "kind": "binary", "source": { "id": "", "name": "libtirpc", "version": "1.3.3-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "+HmNQdmjJTL5gC4nHHd6rw==": { "id": "+HmNQdmjJTL5gC4nHHd6rw==", "name": "kernel-srpm-macros", "version": "1.0-14.el9", "kind": "binary", "source": { "id": "", "name": "kernel-srpm-macros", "version": "1.0-14.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "+X1MdmtPTbyDb/wq7joJhA==": { "id": "+X1MdmtPTbyDb/wq7joJhA==", "name": "libtool-ltdl", "version": "2.4.6-46.el9", "kind": "binary", "source": { "id": "", "name": "libtool", "version": "2.4.6-46.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "+bwl6UbMaWOBWdHNekJsEw==": { "id": "+bwl6UbMaWOBWdHNekJsEw==", "name": "coreutils-single", "version": "8.32-39.el9", "kind": "binary", "source": { "id": "", "name": "coreutils", "version": "8.32-39.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "+v/DtyduRnxay/g57zCBpw==": { "id": "+v/DtyduRnxay/g57zCBpw==", "name": "python3-librepo", "version": "1.14.5-3.el9", "kind": "binary", "source": { "id": "", "name": "librepo", "version": "1.14.5-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "+y+as2YNBEvOddTPxl73DA==": { "id": "+y+as2YNBEvOddTPxl73DA==", "name": "source-highlight", "version": "3.1.9-12.el9", "kind": "binary", "source": { "id": "", "name": "source-highlight", "version": "3.1.9-12.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/Bb6eVO+je9kbuIGTvt6Ww==": { "id": "/Bb6eVO+je9kbuIGTvt6Ww==", "name": "ncurses", "version": "6.2-12.20210508.el9", "kind": "binary", "source": { "id": "", "name": "ncurses", "version": "6.2-12.20210508.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/L1kFEoHZTukrNTCQLypFQ==": { "id": "/L1kFEoHZTukrNTCQLypFQ==", "name": "xz-libs", "version": "5.2.5-8.el9_0", "kind": "binary", "source": { "id": "", "name": "xz", "version": "5.2.5-8.el9_0", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/O7rOBo1qRMFm3q3Kf3mEw==": { "id": "/O7rOBo1qRMFm3q3Kf3mEw==", "name": "libselinux", "version": "3.6-3.el9", "kind": "binary", "source": { "id": "", "name": "libselinux", "version": "3.6-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/THiuz93dsCZJETS3A4Xtw==": { "id": "/THiuz93dsCZJETS3A4Xtw==", "name": "libcom_err", "version": "1.46.5-8.el9", "kind": "binary", "source": { "id": "", "name": "e2fsprogs", "version": "1.46.5-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/XUXPfxfCal3j0ldx+af3A==": { "id": "/XUXPfxfCal3j0ldx+af3A==", "name": "bzip2", "version": "1.0.8-10.el9_5", "kind": "binary", "source": { "id": "", "name": "bzip2", "version": "1.0.8-10.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/h/TBQhfoSMCmey5oN87jA==": { "id": "/h/TBQhfoSMCmey5oN87jA==", "name": "libsolv", "version": "0.7.24-3.el9", "kind": "binary", "source": { "id": "", "name": "libsolv", "version": "0.7.24-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/l8wc0qlQdZdqgMIy+AX4w==": { "id": "/l8wc0qlQdZdqgMIy+AX4w==", "name": "gcc-c++", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/oIjTiZph8FPjlWNL5s82w==": { "id": "/oIjTiZph8FPjlWNL5s82w==", "name": "environment-modules", "version": "5.3.0-2.el9", "kind": "binary", "source": { "id": "", "name": "environment-modules", "version": "5.3.0-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/oLe91LMLglvpqo76adFGw==": { "id": "/oLe91LMLglvpqo76adFGw==", "name": "dwz", "version": "0.16-1.el9", "kind": "binary", "source": { "id": "", "name": "dwz", "version": "0.16-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "/r9XRETcIT4sCg595ze+cA==": { "id": "/r9XRETcIT4sCg595ze+cA==", "name": "cmake-filesystem", "version": "3.26.5-3.el9_7", "kind": "binary", "source": { "id": "", "name": "cmake", "version": "3.26.5-3.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "0133y/ZC+9hrvuSzgka7cw==": { "id": "0133y/ZC+9hrvuSzgka7cw==", "name": "man-db", "version": "2.9.3-9.el9", "kind": "binary", "source": { "id": "", "name": "man-db", "version": "2.9.3-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "04b0yaCHYk5DVzS89hVjvw==": { "id": "04b0yaCHYk5DVzS89hVjvw==", "name": "libeconf", "version": "0.4.1-4.el9", "kind": "binary", "source": { "id": "", "name": "libeconf", "version": "0.4.1-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "09fH92fqoWDOaYEpwQ9p2g==": { "id": "09fH92fqoWDOaYEpwQ9p2g==", "name": "ed", "version": "1.14.2-12.el9", "kind": "binary", "source": { "id": "", "name": "ed", "version": "1.14.2-12.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "09iCgGFB6KlEK9g5KeyifA==": { "id": "09iCgGFB6KlEK9g5KeyifA==", "name": "systemd-rpm-macros", "version": "252-55.el9_7.7", "kind": "binary", "source": { "id": "", "name": "systemd", "version": "252-55.el9_7.7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "09r8DbZFJmI1tQW/a+ZlWQ==": { "id": "09r8DbZFJmI1tQW/a+ZlWQ==", "name": "shadow-utils", "version": "2:4.9-15.el9", "kind": "binary", "source": { "id": "", "name": "shadow-utils", "version": "4.9-15.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "0NHnPl3pNsT2FH8oGcfyEw==": { "id": "0NHnPl3pNsT2FH8oGcfyEw==", "name": "perl-libs", "version": "4:5.32.1-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "0fqyUk3Q4wjepXsEzVTbuQ==": { "id": "0fqyUk3Q4wjepXsEzVTbuQ==", "name": "libuser", "version": "0.63-17.el9", "kind": "binary", "source": { "id": "", "name": "libuser", "version": "0.63-17.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "0gNpYdx7/dHkr8z85zHOSg==": { "id": "0gNpYdx7/dHkr8z85zHOSg==", "name": "perl-File-stat", "version": "1.09-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "0kf4C6OH9tp4+UaKjumyEg==": { "id": "0kf4C6OH9tp4+UaKjumyEg==", "name": "llvm-filesystem", "version": "20.1.8-3.el9", "kind": "binary", "source": { "id": "", "name": "llvm", "version": "20.1.8-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "0lplo4qGxIA48pUhdbCYJg==": { "id": "0lplo4qGxIA48pUhdbCYJg==", "name": "python3-urllib3", "version": "1.26.5-6.el9_7.1", "kind": "binary", "source": { "id": "", "name": "python-urllib3", "version": "1.26.5-6.el9_7.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "1+Lg0PO3SMtKcC7avbi64w==": { "id": "1+Lg0PO3SMtKcC7avbi64w==", "name": "xorg-x11-proto-devel", "version": "2024.1-1.el9", "kind": "binary", "source": { "id": "", "name": "xorg-x11-proto-devel", "version": "2024.1-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "1XXuvf69/0I2dNHaU2UndQ==": { "id": "1XXuvf69/0I2dNHaU2UndQ==", "name": "patch", "version": "2.7.6-16.el9", "kind": "binary", "source": { "id": "", "name": "patch", "version": "2.7.6-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "1atoBfoH0mJ0bCpetQ7/0g==": { "id": "1atoBfoH0mJ0bCpetQ7/0g==", "name": "file-libs", "version": "5.39-16.el9", "kind": "binary", "source": { "id": "", "name": "file", "version": "5.39-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "1c1WdORtp7MIh8iUYW8joA==": { "id": "1c1WdORtp7MIh8iUYW8joA==", "name": "nodejs-libs", "version": "1:22.19.0-2.module+el9.7.0+23475+0a960596", "kind": "binary", "source": { "id": "", "name": "nodejs", "version": "22.19.0-2.module+el9.7.0+23475+0a960596", "kind": "source", "normalized_version": "", "module": "nodejs:22", "cpe": "" }, "normalized_version": "", "module": "nodejs:22", "arch": "x86_64", "cpe": "" }, "1h2bWnAaSbAMrDYM8V/8sw==": { "id": "1h2bWnAaSbAMrDYM8V/8sw==", "name": "pcre-utf16", "version": "8.44-4.el9", "kind": "binary", "source": { "id": "", "name": "pcre", "version": "8.44-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "1jyJPCL93kiEbfmNKeyz3g==": { "id": "1jyJPCL93kiEbfmNKeyz3g==", "name": "jinja2", "version": "3.1.6", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.3.1.6.0.0.0.0.0.0", "cpe": "" }, "1m9sKqHTfU4F/K4fidg9cg==": { "id": "1m9sKqHTfU4F/K4fidg9cg==", "name": "perl-Exporter", "version": "5.74-461.el9", "kind": "binary", "source": { "id": "", "name": "perl-Exporter", "version": "5.74-461.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "1p1wTPVFlokLdC9/X3ksGg==": { "id": "1p1wTPVFlokLdC9/X3ksGg==", "name": "expat", "version": "2.5.0-5.el9_7.1", "kind": "binary", "source": { "id": "", "name": "expat", "version": "2.5.0-5.el9_7.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "1pWwHIWE2UYOVNkFfcPZhQ==": { "id": "1pWwHIWE2UYOVNkFfcPZhQ==", "name": "sqlite", "version": "3.34.1-9.el9_7", "kind": "binary", "source": { "id": "", "name": "sqlite", "version": "3.34.1-9.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "1pqtMQqVpCMzDCv8KXVyuA==": { "id": "1pqtMQqVpCMzDCv8KXVyuA==", "name": "perl-Class-Struct", "version": "0.66-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "295Mf6xxPMSuYkMc24cf0A==": { "id": "295Mf6xxPMSuYkMc24cf0A==", "name": "mod_session", "version": "2.4.62-7.el9_7.3", "kind": "binary", "source": { "id": "", "name": "httpd", "version": "2.4.62-7.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "2QUKRSh7NN4cTp6+OOEm8w==": { "id": "2QUKRSh7NN4cTp6+OOEm8w==", "name": "rsync", "version": "3.2.5-3.el9", "kind": "binary", "source": { "id": "", "name": "rsync", "version": "3.2.5-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "2gCbp4kt+cF44NF/LqukDg==": { "id": "2gCbp4kt+cF44NF/LqukDg==", "name": "pcre2-syntax", "version": "10.40-6.el9", "kind": "binary", "source": { "id": "", "name": "pcre2", "version": "10.40-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "2hVeGisxeIl5ZCVdBXxWKg==": { "id": "2hVeGisxeIl5ZCVdBXxWKg==", "name": "virt-what", "version": "1.27-2.el9", "kind": "binary", "source": { "id": "", "name": "virt-what", "version": "1.27-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "2w8qE/d9mqIY/9+1qBBrPg==": { "id": "2w8qE/d9mqIY/9+1qBBrPg==", "name": "perl-IO-Socket-IP", "version": "0.41-5.el9", "kind": "binary", "source": { "id": "", "name": "perl-IO-Socket-IP", "version": "0.41-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "2zIvfSXFI57wQ4jcmb8tGg==": { "id": "2zIvfSXFI57wQ4jcmb8tGg==", "name": "pip", "version": "24.2", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.24.2.0.0.0.0.0.0.0", "cpe": "" }, "35MvZs/A5NUjD+xZ1Vlnyw==": { "id": "35MvZs/A5NUjD+xZ1Vlnyw==", "name": "libpkgconf", "version": "1.7.3-10.el9", "kind": "binary", "source": { "id": "", "name": "pkgconf", "version": "1.7.3-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "38FdUixzs3eDg/NPZRiJIA==": { "id": "38FdUixzs3eDg/NPZRiJIA==", "name": "glibc-langpack-en", "version": "2.34-231.el9_7.2", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-231.el9_7.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "3JODNwsCAiV/sk6j3hiOxw==": { "id": "3JODNwsCAiV/sk6j3hiOxw==", "name": "mod_ssl", "version": "1:2.4.62-7.el9_7.3", "kind": "binary", "source": { "id": "", "name": "httpd", "version": "2.4.62-7.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "3XsqGfTFjY5lWf0VTh588Q==": { "id": "3XsqGfTFjY5lWf0VTh588Q==", "name": "werkzeug", "version": "3.1.5", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.3.1.5.0.0.0.0.0.0", "cpe": "" }, "3YAw8el/3rSN8/26QNTqsA==": { "id": "3YAw8el/3rSN8/26QNTqsA==", "name": "pixman", "version": "0.40.0-6.el9_3", "kind": "binary", "source": { "id": "", "name": "pixman", "version": "0.40.0-6.el9_3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "3adzKM06LvCWYFXCgwdnjA==": { "id": "3adzKM06LvCWYFXCgwdnjA==", "name": "efi-srpm-macros", "version": "6-4.el9", "kind": "binary", "source": { "id": "", "name": "efi-rpm-macros", "version": "6-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "3kiQXJjCV5HlO0qf9OFzoQ==": { "id": "3kiQXJjCV5HlO0qf9OFzoQ==", "name": "perl-File-Find", "version": "1.37-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "3xX+GtMW5t5rNj/zejJWEQ==": { "id": "3xX+GtMW5t5rNj/zejJWEQ==", "name": "expat-devel", "version": "2.5.0-5.el9_7.1", "kind": "binary", "source": { "id": "", "name": "expat", "version": "2.5.0-5.el9_7.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "40gZpuDvr8Y82hwRT4gOdw==": { "id": "40gZpuDvr8Y82hwRT4gOdw==", "name": "setuptools", "version": "53.0.0", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.53.0.0.0.0.0.0.0.0", "cpe": "" }, "4DALE9qlRQsocTmGTN3jhg==": { "id": "4DALE9qlRQsocTmGTN3jhg==", "name": "glibc-locale-source", "version": "2.34-231.el9_7.2", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-231.el9_7.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "4Kw/w2gH7CYCOCv19cdYYA==": { "id": "4Kw/w2gH7CYCOCv19cdYYA==", "name": "perl-File-Path", "version": "2.18-4.el9", "kind": "binary", "source": { "id": "", "name": "perl-File-Path", "version": "2.18-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "4ThUof0MfmoEHGOuzmENug==": { "id": "4ThUof0MfmoEHGOuzmENug==", "name": "click", "version": "8.1.8", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.8.1.8.0.0.0.0.0.0", "cpe": "" }, "4U8NwfIL6oZ9HtlVrK/5EQ==": { "id": "4U8NwfIL6oZ9HtlVrK/5EQ==", "name": "gettext", "version": "0.21-8.el9", "kind": "binary", "source": { "id": "", "name": "gettext", "version": "0.21-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "4xm12R/wZXmG2Cs/ve2Zjw==": { "id": "4xm12R/wZXmG2Cs/ve2Zjw==", "name": "cpp", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "5+tHFkkNi+1rUDSrmgYdkw==": { "id": "5+tHFkkNi+1rUDSrmgYdkw==", "name": "p11-kit-trust", "version": "0.25.3-3.el9_5", "kind": "binary", "source": { "id": "", "name": "p11-kit", "version": "0.25.3-3.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "57fPIXyc5AjSlhOEn9ApPA==": { "id": "57fPIXyc5AjSlhOEn9ApPA==", "name": "apr-util-openssl", "version": "1.6.1-23.el9", "kind": "binary", "source": { "id": "", "name": "apr-util", "version": "1.6.1-23.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "582nBqlxZXz0sTRmkFvU4Q==": { "id": "582nBqlxZXz0sTRmkFvU4Q==", "name": "libxcb", "version": "1.13.1-9.el9", "kind": "binary", "source": { "id": "", "name": "libxcb", "version": "1.13.1-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "5GtYmv+rWUY9Nq0zLzVwuQ==": { "id": "5GtYmv+rWUY9Nq0zLzVwuQ==", "name": "automake", "version": "1.16.2-8.el9", "kind": "binary", "source": { "id": "", "name": "automake", "version": "1.16.2-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "5JAFUJWmy04+T6x2oJw2jg==": { "id": "5JAFUJWmy04+T6x2oJw2jg==", "name": "libxml2", "version": "2.9.13-14.el9_7", "kind": "binary", "source": { "id": "", "name": "libxml2", "version": "2.9.13-14.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "5ZNEjbI9oKcr993lWqrXFA==": { "id": "5ZNEjbI9oKcr993lWqrXFA==", "name": "hunspell-en-US", "version": "0.20140811.1-20.el9", "kind": "binary", "source": { "id": "", "name": "hunspell-en", "version": "0.20140811.1-20.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "5hkeK2sS5i1OF8czY7eD+A==": { "id": "5hkeK2sS5i1OF8czY7eD+A==", "name": "perl-HTTP-Tiny", "version": "0.076-462.el9", "kind": "binary", "source": { "id": "", "name": "perl-HTTP-Tiny", "version": "0.076-462.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "5j7LQGobcmm2zwYTgrA27g==": { "id": "5j7LQGobcmm2zwYTgrA27g==", "name": "openssl-devel", "version": "1:3.5.1-7.el9_7", "kind": "binary", "source": { "id": "", "name": "openssl", "version": "3.5.1-7.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "5x6eb7pZ/EuGII0pLw9fTg==": { "id": "5x6eb7pZ/EuGII0pLw9fTg==", "name": "libffi-devel", "version": "3.4.2-8.el9", "kind": "binary", "source": { "id": "", "name": "libffi", "version": "3.4.2-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "60b1mOIk+ncF/benyKWfug==": { "id": "60b1mOIk+ncF/benyKWfug==", "name": "perl-Data-Dumper", "version": "2.174-462.el9", "kind": "binary", "source": { "id": "", "name": "perl-Data-Dumper", "version": "2.174-462.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "60pEkQUMtqjJkDtrBnZkZw==": { "id": "60pEkQUMtqjJkDtrBnZkZw==", "name": "rpm-build-libs", "version": "4.16.1.3-39.el9", "kind": "binary", "source": { "id": "", "name": "rpm", "version": "4.16.1.3-39.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "65vQ2fJTp0DlFVHdZmyGLw==": { "id": "65vQ2fJTp0DlFVHdZmyGLw==", "name": "rpm-sign-libs", "version": "4.16.1.3-39.el9", "kind": "binary", "source": { "id": "", "name": "rpm", "version": "4.16.1.3-39.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "6AYt+NWt55432RGa/HxiQg==": { "id": "6AYt+NWt55432RGa/HxiQg==", "name": "libXt", "version": "1.2.0-6.el9", "kind": "binary", "source": { "id": "", "name": "libXt", "version": "1.2.0-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "6G1ytjIPgX0NNsVwuPQKkQ==": { "id": "6G1ytjIPgX0NNsVwuPQKkQ==", "name": "python3-gpg", "version": "1.15.1-6.el9", "kind": "binary", "source": { "id": "", "name": "gpgme", "version": "1.15.1-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "6HUC1/dPziZpbtWEymw0nQ==": { "id": "6HUC1/dPziZpbtWEymw0nQ==", "name": "gzip", "version": "1.12-1.el9", "kind": "binary", "source": { "id": "", "name": "gzip", "version": "1.12-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "6MFxZDjn6ZxVQspQib4VSA==": { "id": "6MFxZDjn6ZxVQspQib4VSA==", "name": "libXau", "version": "1.0.9-8.el9", "kind": "binary", "source": { "id": "", "name": "libXau", "version": "1.0.9-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "6SavbYlBTSu7ROvcE770Zw==": { "id": "6SavbYlBTSu7ROvcE770Zw==", "name": "apr-devel", "version": "1.7.0-12.el9_3", "kind": "binary", "source": { "id": "", "name": "apr", "version": "1.7.0-12.el9_3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "6yTvnPP57NJPXUaaMuHa5Q==": { "id": "6yTvnPP57NJPXUaaMuHa5Q==", "name": "libdnf", "version": "0.69.0-16.el9", "kind": "binary", "source": { "id": "", "name": "libdnf", "version": "0.69.0-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "7/k2KO9ZYtIX1WvnibuCwg==": { "id": "7/k2KO9ZYtIX1WvnibuCwg==", "name": "procps-ng", "version": "3.3.17-14.el9", "kind": "binary", "source": { "id": "", "name": "procps-ng", "version": "3.3.17-14.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "71E7ojyMFQ1Uwy0VMr2WLg==": { "id": "71E7ojyMFQ1Uwy0VMr2WLg==", "name": "rpm", "version": "4.16.1.3-39.el9", "kind": "binary", "source": { "id": "", "name": "rpm", "version": "4.16.1.3-39.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "79w3HVLsEs5/x4dQ41zIww==": { "id": "79w3HVLsEs5/x4dQ41zIww==", "name": "httpd-filesystem", "version": "2.4.62-7.el9_7.3", "kind": "binary", "source": { "id": "", "name": "httpd", "version": "2.4.62-7.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "7NGPdoQ8CufgoRI2a0XI0g==": { "id": "7NGPdoQ8CufgoRI2a0XI0g==", "name": "perl-File-Compare", "version": "1.100.600-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "7cpIREEQnkaI7dbmWgmrvg==": { "id": "7cpIREEQnkaI7dbmWgmrvg==", "name": "gdbm-libs", "version": "1:1.23-1.el9", "kind": "binary", "source": { "id": "", "name": "gdbm", "version": "1.23-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "7mDaaxs3ev+uNEDYC97U3Q==": { "id": "7mDaaxs3ev+uNEDYC97U3Q==", "name": "zlib", "version": "1.2.11-40.el9", "kind": "binary", "source": { "id": "", "name": "zlib", "version": "1.2.11-40.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "7qfWfLUwHD4fkKHlCNW7rg==": { "id": "7qfWfLUwHD4fkKHlCNW7rg==", "name": "brotli", "version": "1.0.9-9.el9_7", "kind": "binary", "source": { "id": "", "name": "brotli", "version": "1.0.9-9.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "7yB5oIQve4tWIMlUmHbdQQ==": { "id": "7yB5oIQve4tWIMlUmHbdQQ==", "name": "graphite2", "version": "1.3.14-9.el9", "kind": "binary", "source": { "id": "", "name": "graphite2", "version": "1.3.14-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "8+AT+dHyoFXmtWYeClg3hQ==": { "id": "8+AT+dHyoFXmtWYeClg3hQ==", "name": "libmnl", "version": "1.0.4-16.el9_4", "kind": "binary", "source": { "id": "", "name": "libmnl", "version": "1.0.4-16.el9_4", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "8/+OIixLXu+fX/6UoQwl/g==": { "id": "8/+OIixLXu+fX/6UoQwl/g==", "name": "go-srpm-macros", "version": "3.6.0-12.el9_7", "kind": "binary", "source": { "id": "", "name": "go-rpm-macros", "version": "3.6.0-12.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "84bRLUIEkPTIUqXqCtZLvw==": { "id": "84bRLUIEkPTIUqXqCtZLvw==", "name": "tzdata", "version": "2025c-1.el9", "kind": "binary", "source": { "id": "", "name": "tzdata", "version": "2025c-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "87EcTL94JiygUQLwYuL2AQ==": { "id": "87EcTL94JiygUQLwYuL2AQ==", "name": "libbrotli", "version": "1.0.9-9.el9_7", "kind": "binary", "source": { "id": "", "name": "brotli", "version": "1.0.9-9.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "88jYB91M4ddvxo2XjMJKmQ==": { "id": "88jYB91M4ddvxo2XjMJKmQ==", "name": "libmpc", "version": "1.2.1-4.el9", "kind": "binary", "source": { "id": "", "name": "libmpc", "version": "1.2.1-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "8Al1Y3mQILwPqoFjfjIK0Q==": { "id": "8Al1Y3mQILwPqoFjfjIK0Q==", "name": "python3-setuptools-wheel", "version": "53.0.0-15.el9", "kind": "binary", "source": { "id": "", "name": "python-setuptools", "version": "53.0.0-15.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "8WvHUwfWJkE1eIMXK0EUTA==": { "id": "8WvHUwfWJkE1eIMXK0EUTA==", "name": "python3-devel", "version": "3.9.25-3.el9_7", "kind": "binary", "source": { "id": "", "name": "python3.9", "version": "3.9.25-3.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "8dKij0lKhp8eGM5ynaMPfg==": { "id": "8dKij0lKhp8eGM5ynaMPfg==", "name": "glibc-minimal-langpack", "version": "2.34-231.el9_7.2", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-231.el9_7.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "8gpmX0NZa9MMhcqi6FUGtg==": { "id": "8gpmX0NZa9MMhcqi6FUGtg==", "name": "python3-gobject-base", "version": "3.40.1-6.el9", "kind": "binary", "source": { "id": "", "name": "pygobject3", "version": "3.40.1-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "8k+Ulo3wv2SSKo3DSJNJ6A==": { "id": "8k+Ulo3wv2SSKo3DSJNJ6A==", "name": "kmod-libs", "version": "28-11.el9", "kind": "binary", "source": { "id": "", "name": "kmod", "version": "28-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "8n6bVUPPsV3vtnz+vLHqKQ==": { "id": "8n6bVUPPsV3vtnz+vLHqKQ==", "name": "pam", "version": "1.5.1-26.el9_6", "kind": "binary", "source": { "id": "", "name": "pam", "version": "1.5.1-26.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "8uME+PFu6p/OAD7q+ZTVLw==": { "id": "8uME+PFu6p/OAD7q+ZTVLw==", "name": "p11-kit", "version": "0.25.3-3.el9_5", "kind": "binary", "source": { "id": "", "name": "p11-kit", "version": "0.25.3-3.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "8uNlRHm24HlCfj4vRuzAgA==": { "id": "8uNlRHm24HlCfj4vRuzAgA==", "name": "perl-if", "version": "0.60.800-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "96s6QUkd81n7TEwh/GoZsQ==": { "id": "96s6QUkd81n7TEwh/GoZsQ==", "name": "util-linux-core", "version": "2.37.4-21.el9_7", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "9HjCH3SeUwgItfYZysNlOw==": { "id": "9HjCH3SeUwgItfYZysNlOw==", "name": "mariadb-connector-c-config", "version": "3.2.6-1.el9_0", "kind": "binary", "source": { "id": "", "name": "mariadb-connector-c", "version": "3.2.6-1.el9_0", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "9bMXqD09C2r4s8P+HNy2uw==": { "id": "9bMXqD09C2r4s8P+HNy2uw==", "name": "perl-Pod-Perldoc", "version": "3.28.01-461.el9", "kind": "binary", "source": { "id": "", "name": "perl-Pod-Perldoc", "version": "3.28.01-461.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "9olIUlLHZMdoUMju+8diyQ==": { "id": "9olIUlLHZMdoUMju+8diyQ==", "name": "filesystem", "version": "3.16-5.el9", "kind": "binary", "source": { "id": "", "name": "filesystem", "version": "3.16-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "A5zg77FwqyQ7YbgSi5bkFw==": { "id": "A5zg77FwqyQ7YbgSi5bkFw==", "name": "libxslt-devel", "version": "1.1.34-13.el9_6", "kind": "binary", "source": { "id": "", "name": "libxslt", "version": "1.1.34-13.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ACNA1cjsRpihwLsZYxMiYQ==": { "id": "ACNA1cjsRpihwLsZYxMiYQ==", "name": "libXrender", "version": "0.9.10-16.el9", "kind": "binary", "source": { "id": "", "name": "libXrender", "version": "0.9.10-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "AMvlCR3g+vHIXnbjgXeX2Q==": { "id": "AMvlCR3g+vHIXnbjgXeX2Q==", "name": "redhat-rpm-config", "version": "210-1.el9", "kind": "binary", "source": { "id": "", "name": "redhat-rpm-config", "version": "210-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "AUjudWCWcMUZtLYqynIMkg==": { "id": "AUjudWCWcMUZtLYqynIMkg==", "name": "tpm2-tss", "version": "3.2.3-1.el9", "kind": "binary", "source": { "id": "", "name": "tpm2-tss", "version": "3.2.3-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "AbW1lRpGUjSEKNnr/Toz6A==": { "id": "AbW1lRpGUjSEKNnr/Toz6A==", "name": "jbigkit-libs", "version": "2.1-23.el9", "kind": "binary", "source": { "id": "", "name": "jbigkit", "version": "2.1-23.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "AsexXT9SbeDFWXwi6d7SxQ==": { "id": "AsexXT9SbeDFWXwi6d7SxQ==", "name": "gcc-gfortran", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "At9otkYcx2c7gDG/+qxMog==": { "id": "At9otkYcx2c7gDG/+qxMog==", "name": "libxml2-devel", "version": "2.9.13-14.el9_7", "kind": "binary", "source": { "id": "", "name": "libxml2", "version": "2.9.13-14.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "BBozCOtHwec3Xfe7j7ZMUw==": { "id": "BBozCOtHwec3Xfe7j7ZMUw==", "name": "mod_lua", "version": "2.4.62-7.el9_7.3", "kind": "binary", "source": { "id": "", "name": "httpd", "version": "2.4.62-7.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "BIzbOPagaosMprtM0oW/UQ==": { "id": "BIzbOPagaosMprtM0oW/UQ==", "name": "git-core-doc", "version": "2.47.3-1.el9_6", "kind": "binary", "source": { "id": "", "name": "git", "version": "2.47.3-1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "BQhiFmX4hLYteW4oRCLTSA==": { "id": "BQhiFmX4hLYteW4oRCLTSA==", "name": "libassuan", "version": "2.5.5-3.el9", "kind": "binary", "source": { "id": "", "name": "libassuan", "version": "2.5.5-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "BRLVvSCW1qZQlEQR2x48fQ==": { "id": "BRLVvSCW1qZQlEQR2x48fQ==", "name": "gobject-introspection", "version": "1.68.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gobject-introspection", "version": "1.68.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Be3u3fxCSx0yV9rW5tn7+A==": { "id": "Be3u3fxCSx0yV9rW5tn7+A==", "name": "harfbuzz-icu", "version": "2.7.4-10.el9", "kind": "binary", "source": { "id": "", "name": "harfbuzz", "version": "2.7.4-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "CM/XLOAV8nEwvYEgfvOluA==": { "id": "CM/XLOAV8nEwvYEgfvOluA==", "name": "perl-Net-SSLeay", "version": "1.94-3.el9", "kind": "binary", "source": { "id": "", "name": "perl-Net-SSLeay", "version": "1.94-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "CQ7LW8sdHcbka0B3IpMM1Q==": { "id": "CQ7LW8sdHcbka0B3IpMM1Q==", "name": "which", "version": "2.21-30.el9_6", "kind": "binary", "source": { "id": "", "name": "which", "version": "2.21-30.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "CS6z0/SKwjMOr6VBFQ1+lw==": { "id": "CS6z0/SKwjMOr6VBFQ1+lw==", "name": "findutils", "version": "1:4.8.0-7.el9", "kind": "binary", "source": { "id": "", "name": "findutils", "version": "4.8.0-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "CfMo51dlSGLRWNluoKfMUQ==": { "id": "CfMo51dlSGLRWNluoKfMUQ==", "name": "perl-Scalar-List-Utils", "version": "4:1.56-462.el9", "kind": "binary", "source": { "id": "", "name": "perl-Scalar-List-Utils", "version": "1.56-462.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Cn4UOizx3r/8sEEZ0cgGfw==": { "id": "Cn4UOizx3r/8sEEZ0cgGfw==", "name": "libgomp", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "CpfomSYboaXPZ9yn9NgGgw==": { "id": "CpfomSYboaXPZ9yn9NgGgw==", "name": "krb5-libs", "version": "1.21.1-8.el9_6", "kind": "binary", "source": { "id": "", "name": "krb5", "version": "1.21.1-8.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Cwut2mrMMUaIvKenvO1qWw==": { "id": "Cwut2mrMMUaIvKenvO1qWw==", "name": "perl-Socket", "version": "4:2.031-4.el9", "kind": "binary", "source": { "id": "", "name": "perl-Socket", "version": "2.031-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "D0cOLNJoJ2zu9AQItFxRQA==": { "id": "D0cOLNJoJ2zu9AQItFxRQA==", "name": "apr-util-bdb", "version": "1.6.1-23.el9", "kind": "binary", "source": { "id": "", "name": "apr-util", "version": "1.6.1-23.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "D3RCrUIdQ+uwLTm+GGcqSA==": { "id": "D3RCrUIdQ+uwLTm+GGcqSA==", "name": "autoconf", "version": "2.69-41.el9", "kind": "binary", "source": { "id": "", "name": "autoconf", "version": "2.69-41.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "D5m7YK6SRxMXWJzbEMw9qw==": { "id": "D5m7YK6SRxMXWJzbEMw9qw==", "name": "pyproject-srpm-macros", "version": "1.16.2-1.el9", "kind": "binary", "source": { "id": "", "name": "pyproject-rpm-macros", "version": "1.16.2-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "DK0d2bPQCX0xz6Lec7u1cg==": { "id": "DK0d2bPQCX0xz6Lec7u1cg==", "name": "info", "version": "6.7-15.el9", "kind": "binary", "source": { "id": "", "name": "texinfo", "version": "6.7-15.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "DNyIkrd4IXePRueLDNc6ZA==": { "id": "DNyIkrd4IXePRueLDNc6ZA==", "name": "libXpm", "version": "3.5.13-10.el9", "kind": "binary", "source": { "id": "", "name": "libXpm", "version": "3.5.13-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "DVT5EsNYhhc4TADNn+PvwA==": { "id": "DVT5EsNYhhc4TADNn+PvwA==", "name": "rootfiles", "version": "8.1-35.el9", "kind": "binary", "source": { "id": "", "name": "rootfiles", "version": "8.1-35.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "DVWG3mWD7odZzCgFCUPZPw==": { "id": "DVWG3mWD7odZzCgFCUPZPw==", "name": "pkgconf-pkg-config", "version": "1.7.3-10.el9", "kind": "binary", "source": { "id": "", "name": "pkgconf", "version": "1.7.3-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "DY5Co0gkGtbgwDlkjfJLWA==": { "id": "DY5Co0gkGtbgwDlkjfJLWA==", "name": "markupsafe", "version": "3.0.3", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.3.0.3.0.0.0.0.0.0", "cpe": "" }, "Dr450EIuIZqHVptoUeerYQ==": { "id": "Dr450EIuIZqHVptoUeerYQ==", "name": "libpng", "version": "2:1.6.37-12.el9_7.1", "kind": "binary", "source": { "id": "", "name": "libpng", "version": "1.6.37-12.el9_7.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "DrLq8qfU1bfE8o8AfdvkrQ==": { "id": "DrLq8qfU1bfE8o8AfdvkrQ==", "name": "libverto", "version": "0.3.2-3.el9", "kind": "binary", "source": { "id": "", "name": "libverto", "version": "0.3.2-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "DyVc00dL0fB/TbUtdImPIA==": { "id": "DyVc00dL0fB/TbUtdImPIA==", "name": "libedit", "version": "3.1-38.20210216cvs.el9", "kind": "binary", "source": { "id": "", "name": "libedit", "version": "3.1-38.20210216cvs.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "EEcEMKhGMvXAfnMhboIpqw==": { "id": "EEcEMKhGMvXAfnMhboIpqw==", "name": "publicsuffix-list-dafsa", "version": "20210518-3.el9", "kind": "binary", "source": { "id": "", "name": "publicsuffix-list", "version": "20210518-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "ESNqe3PeaOUuYEzUgxfVAA==": { "id": "ESNqe3PeaOUuYEzUgxfVAA==", "name": "python3-libs", "version": "3.9.25-3.el9_7", "kind": "binary", "source": { "id": "", "name": "python3.9", "version": "3.9.25-3.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "EhaFwS5l8+kj0ips0KX28g==": { "id": "EhaFwS5l8+kj0ips0KX28g==", "name": "vim-minimal", "version": "2:8.2.2637-23.el9_7", "kind": "binary", "source": { "id": "", "name": "vim", "version": "8.2.2637-23.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "EjrCko4EN35q3gOrHdIWjw==": { "id": "EjrCko4EN35q3gOrHdIWjw==", "name": "rpm-libs", "version": "4.16.1.3-39.el9", "kind": "binary", "source": { "id": "", "name": "rpm", "version": "4.16.1.3-39.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "EnQzaG96EBHr5ye6u8iVOQ==": { "id": "EnQzaG96EBHr5ye6u8iVOQ==", "name": "mailcap", "version": "2.1.49-5.el9", "kind": "binary", "source": { "id": "", "name": "mailcap", "version": "2.1.49-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "Ep9qjtRg5KBEw8RkogSOKQ==": { "id": "Ep9qjtRg5KBEw8RkogSOKQ==", "name": "python3-dateutil", "version": "1:2.9.0.post0-1.el9_7", "kind": "binary", "source": { "id": "", "name": "python-dateutil", "version": "2.9.0.post0-1.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "Esfj4A6yCPG0aR5IhgHmUg==": { "id": "Esfj4A6yCPG0aR5IhgHmUg==", "name": "libgcc", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Exv8+xTp+7Y4AfuM+ph47Q==": { "id": "Exv8+xTp+7Y4AfuM+ph47Q==", "name": "perl-parent", "version": "1:0.238-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-parent", "version": "0.238-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "F90x58kELkC16MbTpMw3vg==": { "id": "F90x58kELkC16MbTpMw3vg==", "name": "perl-POSIX", "version": "1.94-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FDdpwYO23GZzR/6AZCdQZA==": { "id": "FDdpwYO23GZzR/6AZCdQZA==", "name": "harfbuzz", "version": "2.7.4-10.el9", "kind": "binary", "source": { "id": "", "name": "harfbuzz", "version": "2.7.4-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FEF27h+V5TzrUeQsFddapA==": { "id": "FEF27h+V5TzrUeQsFddapA==", "name": "libSM", "version": "1.2.3-10.el9", "kind": "binary", "source": { "id": "", "name": "libSM", "version": "1.2.3-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FEW4+DY0GhovHIdRCyqYhg==": { "id": "FEW4+DY0GhovHIdRCyqYhg==", "name": "gnutls", "version": "3.8.3-9.el9", "kind": "binary", "source": { "id": "", "name": "gnutls", "version": "3.8.3-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FFSNe661VBElA1asGZ7k3g==": { "id": "FFSNe661VBElA1asGZ7k3g==", "name": "rust-srpm-macros", "version": "17-4.el9", "kind": "binary", "source": { "id": "", "name": "rust-srpm-macros", "version": "17-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "FKD/ouYSWOOZHy4i43SaxA==": { "id": "FKD/ouYSWOOZHy4i43SaxA==", "name": "perl-TermReadKey", "version": "2.38-11.el9", "kind": "binary", "source": { "id": "", "name": "perl-TermReadKey", "version": "2.38-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FW8ByCOP6ljvNWDQolahwg==": { "id": "FW8ByCOP6ljvNWDQolahwg==", "name": "sysprof-capture-devel", "version": "3.40.1-3.el9", "kind": "binary", "source": { "id": "", "name": "sysprof", "version": "3.40.1-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FaNO6QWs1mWPp40PrBiBUQ==": { "id": "FaNO6QWs1mWPp40PrBiBUQ==", "name": "libseccomp", "version": "2.5.2-2.el9", "kind": "binary", "source": { "id": "", "name": "libseccomp", "version": "2.5.2-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FiLBkAWUUsnpX53xBEBwNw==": { "id": "FiLBkAWUUsnpX53xBEBwNw==", "name": "dbus", "version": "1:1.12.20-8.el9", "kind": "binary", "source": { "id": "", "name": "dbus", "version": "1.12.20-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FoNZoDzlktTR7m0xbn6aAw==": { "id": "FoNZoDzlktTR7m0xbn6aAw==", "name": "python3-libdnf", "version": "0.69.0-16.el9", "kind": "binary", "source": { "id": "", "name": "libdnf", "version": "0.69.0-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "FoncQi9chif7gDbfNIi6VQ==": { "id": "FoncQi9chif7gDbfNIi6VQ==", "name": "file", "version": "5.39-16.el9", "kind": "binary", "source": { "id": "", "name": "file", "version": "5.39-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "G1YDEd7+V95Qa+PMxB8sJw==": { "id": "G1YDEd7+V95Qa+PMxB8sJw==", "name": "perl-Digest", "version": "1.19-4.el9", "kind": "binary", "source": { "id": "", "name": "perl-Digest", "version": "1.19-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "G61ZL2SOHR2qgvQfi118gw==": { "id": "G61ZL2SOHR2qgvQfi118gw==", "name": "dejavu-sans-fonts", "version": "2.37-18.el9", "kind": "binary", "source": { "id": "", "name": "dejavu-fonts", "version": "2.37-18.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "GIScmMWQrnoFNoEgq3fg2w==": { "id": "GIScmMWQrnoFNoEgq3fg2w==", "name": "python3-dbus", "version": "1.2.18-2.el9", "kind": "binary", "source": { "id": "", "name": "dbus-python", "version": "1.2.18-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "GJbaWmnnmSb6F31bTeHB5g==": { "id": "GJbaWmnnmSb6F31bTeHB5g==", "name": "libsmartcols", "version": "2.37.4-21.el9_7", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "GSkR2SOuqWQN8NtOvU4cgw==": { "id": "GSkR2SOuqWQN8NtOvU4cgw==", "name": "perl-Thread-Queue", "version": "3.14-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-Thread-Queue", "version": "3.14-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "GcPR4oPcmP8xTRqQf8mOrA==": { "id": "GcPR4oPcmP8xTRqQf8mOrA==", "name": "zipp", "version": "3.23.0", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.3.23.0.0.0.0.0.0.0", "cpe": "" }, "GdLrcchvFseDsR7KOv0vSQ==": { "id": "GdLrcchvFseDsR7KOv0vSQ==", "name": "crypto-policies", "version": "20250905-1.git377cc42.el9_7", "kind": "binary", "source": { "id": "", "name": "crypto-policies", "version": "20250905-1.git377cc42.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "Gfe/qKITedzO94FGUpZ5bQ==": { "id": "Gfe/qKITedzO94FGUpZ5bQ==", "name": "httpd-core", "version": "2.4.62-7.el9_7.3", "kind": "binary", "source": { "id": "", "name": "httpd", "version": "2.4.62-7.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "GpOp3xfmb0XA+PmFyqyn0g==": { "id": "GpOp3xfmb0XA+PmFyqyn0g==", "name": "libquadmath", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "GrohJMl/MISMll2qndOSGg==": { "id": "GrohJMl/MISMll2qndOSGg==", "name": "libX11-xcb", "version": "1.7.0-11.el9", "kind": "binary", "source": { "id": "", "name": "libX11", "version": "1.7.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "GtFO3rQtk4lExV/Q1qfFOg==": { "id": "GtFO3rQtk4lExV/Q1qfFOg==", "name": "zip", "version": "3.0-35.el9", "kind": "binary", "source": { "id": "", "name": "zip", "version": "3.0-35.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "GwNK8p9XcJLynTdoZWdCxg==": { "id": "GwNK8p9XcJLynTdoZWdCxg==", "name": "libdb", "version": "5.3.28-57.el9_6", "kind": "binary", "source": { "id": "", "name": "libdb", "version": "5.3.28-57.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "H3zfV58LzeEUiNQbZbZb2A==": { "id": "H3zfV58LzeEUiNQbZbZb2A==", "name": "perl-File-Temp", "version": "1:0.231.100-4.el9", "kind": "binary", "source": { "id": "", "name": "perl-File-Temp", "version": "0.231.100-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "HFwGHerHwgvY8vkjr3x1Pg==": { "id": "HFwGHerHwgvY8vkjr3x1Pg==", "name": "itsdangerous", "version": "2.2.0", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.2.2.0.0.0.0.0.0.0", "cpe": "" }, "HKlRsQZtXaa3HoNDv500tg==": { "id": "HKlRsQZtXaa3HoNDv500tg==", "name": "openssl-fips-provider-so", "version": "3.0.7-8.el9", "kind": "binary", "source": { "id": "", "name": "openssl-fips-provider", "version": "3.0.7-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "HQdWvmyUSqtI3UTY0T4JiQ==": { "id": "HQdWvmyUSqtI3UTY0T4JiQ==", "name": "pcre", "version": "8.44-4.el9", "kind": "binary", "source": { "id": "", "name": "pcre", "version": "8.44-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "HaOoNwb8lV6rMAwKRGxXbA==": { "id": "HaOoNwb8lV6rMAwKRGxXbA==", "name": "python3-dnf-plugins-core", "version": "4.3.0-24.el9_7", "kind": "binary", "source": { "id": "", "name": "dnf-plugins-core", "version": "4.3.0-24.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "HyWYXl8ZaOY6wtr4mKF7qA==": { "id": "HyWYXl8ZaOY6wtr4mKF7qA==", "name": "elfutils-libelf", "version": "0.193-1.el9", "kind": "binary", "source": { "id": "", "name": "elfutils", "version": "0.193-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "I16VSEydeiRYB1TSf5694A==": { "id": "I16VSEydeiRYB1TSf5694A==", "name": "libreport-filesystem", "version": "2.15.2-6.el9", "kind": "binary", "source": { "id": "", "name": "libreport", "version": "2.15.2-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "I4xeNeKgfXcsAYIlRhjPiQ==": { "id": "I4xeNeKgfXcsAYIlRhjPiQ==", "name": "glibc-devel", "version": "2.34-231.el9_7.2", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-231.el9_7.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "IC3qYOgP07zDDhN8OMm04Q==": { "id": "IC3qYOgP07zDDhN8OMm04Q==", "name": "perl-lib", "version": "0.65-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "IDaB7M+//88qbPppM+LpUw==": { "id": "IDaB7M+//88qbPppM+LpUw==", "name": "cracklib", "version": "2.9.6-27.el9", "kind": "binary", "source": { "id": "", "name": "cracklib", "version": "2.9.6-27.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "IG/inuDbgBm/XuY2u/Aumw==": { "id": "IG/inuDbgBm/XuY2u/Aumw==", "name": "vim-filesystem", "version": "2:8.2.2637-23.el9_7", "kind": "binary", "source": { "id": "", "name": "vim", "version": "8.2.2637-23.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "IZ65O3ZOapykHwhaOX1/YA==": { "id": "IZ65O3ZOapykHwhaOX1/YA==", "name": "libnghttp2", "version": "1.43.0-6.el9", "kind": "binary", "source": { "id": "", "name": "nghttp2", "version": "1.43.0-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "IqB8E1ANUG9NXQorLZJDiQ==": { "id": "IqB8E1ANUG9NXQorLZJDiQ==", "name": "perl-DynaLoader", "version": "1.47-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "IxIhH0Z+Om/E2wWJgs7oqA==": { "id": "IxIhH0Z+Om/E2wWJgs7oqA==", "name": "libstdc++-devel", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "J4wVTpjsd90BinvJHS7Zqw==": { "id": "J4wVTpjsd90BinvJHS7Zqw==", "name": "sqlite-devel", "version": "3.34.1-9.el9_7", "kind": "binary", "source": { "id": "", "name": "sqlite", "version": "3.34.1-9.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "J9w4G6G8Fb/RA473Yv5YuA==": { "id": "J9w4G6G8Fb/RA473Yv5YuA==", "name": "libpq", "version": "13.23-1.el9_7", "kind": "binary", "source": { "id": "", "name": "libpq", "version": "13.23-1.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "JAKIgWlsG9s5Mu8FvR37Sw==": { "id": "JAKIgWlsG9s5Mu8FvR37Sw==", "name": "atlas-devel", "version": "3.10.3-17.el9", "kind": "binary", "source": { "id": "", "name": "atlas", "version": "3.10.3-17.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "JF/KXrYQKwPQyQXcXBUzkQ==": { "id": "JF/KXrYQKwPQyQXcXBUzkQ==", "name": "librepo", "version": "1.14.5-3.el9", "kind": "binary", "source": { "id": "", "name": "librepo", "version": "1.14.5-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "JKP7JzVg7UGaAz4VrH03lQ==": { "id": "JKP7JzVg7UGaAz4VrH03lQ==", "name": "langpacks-core-font-en", "version": "3.0-16.el9", "kind": "binary", "source": { "id": "", "name": "langpacks", "version": "3.0-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "JaeGSHoaw5r486gmcDmRVA==": { "id": "JaeGSHoaw5r486gmcDmRVA==", "name": "gcc-plugin-annobin", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "JqFHrTWNQg3BZ/lmHZPpiQ==": { "id": "JqFHrTWNQg3BZ/lmHZPpiQ==", "name": "npm", "version": "1:10.9.3-1.22.19.0.2.module+el9.7.0+23475+0a960596", "kind": "binary", "source": { "id": "", "name": "nodejs", "version": "22.19.0-2.module+el9.7.0+23475+0a960596", "kind": "source", "normalized_version": "", "module": "nodejs:22", "cpe": "" }, "normalized_version": "", "module": "nodejs:22", "arch": "x86_64", "cpe": "" }, "JsmK7e5qrU0+Ud/3PQYUAQ==": { "id": "JsmK7e5qrU0+Ud/3PQYUAQ==", "name": "libgfortran", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "JyUIec2dlrPxCv2b4i6tRQ==": { "id": "JyUIec2dlrPxCv2b4i6tRQ==", "name": "nodejs-docs", "version": "1:22.19.0-2.module+el9.7.0+23475+0a960596", "kind": "binary", "source": { "id": "", "name": "nodejs", "version": "22.19.0-2.module+el9.7.0+23475+0a960596", "kind": "source", "normalized_version": "", "module": "nodejs:22", "cpe": "" }, "normalized_version": "", "module": "nodejs:22", "arch": "noarch", "cpe": "" }, "KEwhWR+KmcE0gZ+mC6lSDw==": { "id": "KEwhWR+KmcE0gZ+mC6lSDw==", "name": "perl-SelectSaver", "version": "1.02-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "KF5C+zKu/uFB7knCqOvDAQ==": { "id": "KF5C+zKu/uFB7knCqOvDAQ==", "name": "json-glib", "version": "1.6.6-1.el9", "kind": "binary", "source": { "id": "", "name": "json-glib", "version": "1.6.6-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "KH0/KbRUi7KL6UvWa8i6Pg==": { "id": "KH0/KbRUi7KL6UvWa8i6Pg==", "name": "python3-inotify", "version": "0.9.6-25.el9", "kind": "binary", "source": { "id": "", "name": "python-inotify", "version": "0.9.6-25.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "KMPuzPUoJW0H9SIkP0WBiw==": { "id": "KMPuzPUoJW0H9SIkP0WBiw==", "name": "libpath_utils", "version": "0.2.1-53.el9", "kind": "binary", "source": { "id": "", "name": "ding-libs", "version": "0.6.1-53.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "KS0gfrpBqK77mtupKmitjw==": { "id": "KS0gfrpBqK77mtupKmitjw==", "name": "glibc", "version": "2.34-231.el9_7.2", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-231.el9_7.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "KcPAdOork3AFYl8WLwr8lQ==": { "id": "KcPAdOork3AFYl8WLwr8lQ==", "name": "zlib-devel", "version": "1.2.11-40.el9", "kind": "binary", "source": { "id": "", "name": "zlib", "version": "1.2.11-40.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "KcftiMkhTw4x89HNJI8NNg==": { "id": "KcftiMkhTw4x89HNJI8NNg==", "name": "perl-Text-ParseWords", "version": "3.30-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-Text-ParseWords", "version": "3.30-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "KnsryeYjIOfmvupUdl8bDg==": { "id": "KnsryeYjIOfmvupUdl8bDg==", "name": "scl-utils", "version": "1:2.0.3-4.el9", "kind": "binary", "source": { "id": "", "name": "scl-utils", "version": "2.0.3-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "KyRw1LumZrRo6AKKkHgP7w==": { "id": "KyRw1LumZrRo6AKKkHgP7w==", "name": "libXext", "version": "1.3.4-8.el9", "kind": "binary", "source": { "id": "", "name": "libXext", "version": "1.3.4-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "L1CJW90/qIOW7PuGFCWT3g==": { "id": "L1CJW90/qIOW7PuGFCWT3g==", "name": "perl-mro", "version": "1.23-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "L2RUW2Fm5EOgoqwyitY3bg==": { "id": "L2RUW2Fm5EOgoqwyitY3bg==", "name": "dbus-broker", "version": "28-7.el9", "kind": "binary", "source": { "id": "", "name": "dbus-broker", "version": "28-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "LDIMlzOywHz1+CG5FwjKdQ==": { "id": "LDIMlzOywHz1+CG5FwjKdQ==", "name": "subscription-manager-rhsm-certificates", "version": "20220623-1.el9", "kind": "binary", "source": { "id": "", "name": "subscription-manager-rhsm-certificates", "version": "20220623-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "LEyuwSco7tb1WIyWy42H8g==": { "id": "LEyuwSco7tb1WIyWy42H8g==", "name": "perl-Storable", "version": "1:3.21-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-Storable", "version": "3.21-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "LPNXQi0V2EN73HoDD+RYaw==": { "id": "LPNXQi0V2EN73HoDD+RYaw==", "name": "annobin", "version": "12.98-1.el9", "kind": "binary", "source": { "id": "", "name": "annobin", "version": "12.98-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "LPYp5WHbuUIrDoVmdSqGPw==": { "id": "LPYp5WHbuUIrDoVmdSqGPw==", "name": "hunspell-en", "version": "0.20140811.1-20.el9", "kind": "binary", "source": { "id": "", "name": "hunspell-en", "version": "0.20140811.1-20.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "Leh3RdsGa1oyRcl5Dz4SdA==": { "id": "Leh3RdsGa1oyRcl5Dz4SdA==", "name": "gd-devel", "version": "2.3.2-3.el9", "kind": "binary", "source": { "id": "", "name": "gd", "version": "2.3.2-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "LjtOegR/S/Y0KwJeOuSl/w==": { "id": "LjtOegR/S/Y0KwJeOuSl/w==", "name": "perl-podlators", "version": "1:4.14-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-podlators", "version": "4.14-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "Lwqn0aweLQLZmo12VvYcog==": { "id": "Lwqn0aweLQLZmo12VvYcog==", "name": "popt", "version": "1.18-8.el9", "kind": "binary", "source": { "id": "", "name": "popt", "version": "1.18-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "M2qdPAOOvb+CWXJwouP4Rw==": { "id": "M2qdPAOOvb+CWXJwouP4Rw==", "name": "mariadb-connector-c-devel", "version": "3.2.6-1.el9_0", "kind": "binary", "source": { "id": "", "name": "mariadb-connector-c", "version": "3.2.6-1.el9_0", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "MDH8Zt4oQWDiYk9qFV5Lbg==": { "id": "MDH8Zt4oQWDiYk9qFV5Lbg==", "name": "libxcrypt", "version": "4.4.18-3.el9", "kind": "binary", "source": { "id": "", "name": "libxcrypt", "version": "4.4.18-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "MORX6hW9ZLZCt/52w71zTg==": { "id": "MORX6hW9ZLZCt/52w71zTg==", "name": "perl-PathTools", "version": "3.78-461.el9", "kind": "binary", "source": { "id": "", "name": "perl-PathTools", "version": "3.78-461.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "MV68i9xAWcgxaP9HrTHIhA==": { "id": "MV68i9xAWcgxaP9HrTHIhA==", "name": "libmount", "version": "2.37.4-21.el9_7", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "MdGkZ055CI+TZYqVm7FIPg==": { "id": "MdGkZ055CI+TZYqVm7FIPg==", "name": "libcbor", "version": "0.7.0-5.el9", "kind": "binary", "source": { "id": "", "name": "libcbor", "version": "0.7.0-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Mp61fGpK3II0W8dIQgk3hA==": { "id": "Mp61fGpK3II0W8dIQgk3hA==", "name": "libpipeline", "version": "1.5.3-4.el9", "kind": "binary", "source": { "id": "", "name": "libpipeline", "version": "1.5.3-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Mta8K+tWCjAV6ERlLy6JNw==": { "id": "Mta8K+tWCjAV6ERlLy6JNw==", "name": "audit-libs", "version": "3.1.5-7.el9", "kind": "binary", "source": { "id": "", "name": "audit", "version": "3.1.5-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "N08IqNY6mPj7A1ISj62yQw==": { "id": "N08IqNY6mPj7A1ISj62yQw==", "name": "apr", "version": "1.7.0-12.el9_3", "kind": "binary", "source": { "id": "", "name": "apr", "version": "1.7.0-12.el9_3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "N0c+hlw+nQPyLzGzZPE+VQ==": { "id": "N0c+hlw+nQPyLzGzZPE+VQ==", "name": "python3", "version": "3.9.25-3.el9_7", "kind": "binary", "source": { "id": "", "name": "python3.9", "version": "3.9.25-3.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "N2AxbBO2ySQgGMgkdbfo+w==": { "id": "N2AxbBO2ySQgGMgkdbfo+w==", "name": "python3-requests", "version": "2.25.1-10.el9_6", "kind": "binary", "source": { "id": "", "name": "python-requests", "version": "2.25.1-10.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "N9SQ1VZ/1zaqG0gdsMW91g==": { "id": "N9SQ1VZ/1zaqG0gdsMW91g==", "name": "perl-Term-ANSIColor", "version": "5.01-461.el9", "kind": "binary", "source": { "id": "", "name": "perl-Term-ANSIColor", "version": "5.01-461.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "NDKmI4fvu2M/TtapvknDEg==": { "id": "NDKmI4fvu2M/TtapvknDEg==", "name": "libsepol-devel", "version": "3.6-3.el9", "kind": "binary", "source": { "id": "", "name": "libsepol", "version": "3.6-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "NOQ2NY0Q7pXk1a392bTc5Q==": { "id": "NOQ2NY0Q7pXk1a392bTc5Q==", "name": "brotli-devel", "version": "1.0.9-9.el9_7", "kind": "binary", "source": { "id": "", "name": "brotli", "version": "1.0.9-9.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "NSiprMdkK5/5pxuNNJOh2A==": { "id": "NSiprMdkK5/5pxuNNJOh2A==", "name": "openssl-fips-provider", "version": "3.0.7-8.el9", "kind": "binary", "source": { "id": "", "name": "openssl-fips-provider", "version": "3.0.7-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Nak/NGhCYVubG4CsEbHhug==": { "id": "Nak/NGhCYVubG4CsEbHhug==", "name": "graphite2-devel", "version": "1.3.14-9.el9", "kind": "binary", "source": { "id": "", "name": "graphite2", "version": "1.3.14-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "NdCY2/S+syamLH224R4hug==": { "id": "NdCY2/S+syamLH224R4hug==", "name": "langpacks-en", "version": "3.0-16.el9", "kind": "binary", "source": { "id": "", "name": "langpacks", "version": "3.0-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "NsU0bgQSA1JrKw3zvB+XBw==": { "id": "NsU0bgQSA1JrKw3zvB+XBw==", "name": "dbus-libs", "version": "1:1.12.20-8.el9", "kind": "binary", "source": { "id": "", "name": "dbus", "version": "1.12.20-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "O6NCE8KkqNnnBGJrWxfPwA==": { "id": "O6NCE8KkqNnnBGJrWxfPwA==", "name": "libstdc++", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "OCIjbR16ktOEiFK36r0WNw==": { "id": "OCIjbR16ktOEiFK36r0WNw==", "name": "libtasn1", "version": "4.16.0-9.el9", "kind": "binary", "source": { "id": "", "name": "libtasn1", "version": "4.16.0-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "OgwdUybWl/HQYbnPTE4Psw==": { "id": "OgwdUybWl/HQYbnPTE4Psw==", "name": "npth", "version": "1.6-8.el9", "kind": "binary", "source": { "id": "", "name": "npth", "version": "1.6-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Ohssf0Jzlafd9vtrrUKCXg==": { "id": "Ohssf0Jzlafd9vtrrUKCXg==", "name": "bash", "version": "5.1.8-9.el9", "kind": "binary", "source": { "id": "", "name": "bash", "version": "5.1.8-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "OkY4XBjh2jDTkYhGjNkrUA==": { "id": "OkY4XBjh2jDTkYhGjNkrUA==", "name": "mariadb-connector-c", "version": "3.2.6-1.el9_0", "kind": "binary", "source": { "id": "", "name": "mariadb-connector-c", "version": "3.2.6-1.el9_0", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Ol1YWxU11Z64v1nA/zb/5w==": { "id": "Ol1YWxU11Z64v1nA/zb/5w==", "name": "pkgconf", "version": "1.7.3-10.el9", "kind": "binary", "source": { "id": "", "name": "pkgconf", "version": "1.7.3-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "OvOSK0YS4U6j2gyFBATNXg==": { "id": "OvOSK0YS4U6j2gyFBATNXg==", "name": "xz", "version": "5.2.5-8.el9_0", "kind": "binary", "source": { "id": "", "name": "xz", "version": "5.2.5-8.el9_0", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "P5Om9zCJ/QZ+hnrEvj6fGw==": { "id": "P5Om9zCJ/QZ+hnrEvj6fGw==", "name": "libgcrypt", "version": "1.10.0-11.el9", "kind": "binary", "source": { "id": "", "name": "libgcrypt", "version": "1.10.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "PCxuTBi9SbzcxEcQiiLesg==": { "id": "PCxuTBi9SbzcxEcQiiLesg==", "name": "pcre-utf32", "version": "8.44-4.el9", "kind": "binary", "source": { "id": "", "name": "pcre", "version": "8.44-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "PIk2BBAWexCFofMi5q03RA==": { "id": "PIk2BBAWexCFofMi5q03RA==", "name": "pcre2", "version": "10.40-6.el9", "kind": "binary", "source": { "id": "", "name": "pcre2", "version": "10.40-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "PQJujrJagYV+Ey8n4uQ95g==": { "id": "PQJujrJagYV+Ey8n4uQ95g==", "name": "subscription-manager", "version": "1.29.47.1-1.el9_7", "kind": "binary", "source": { "id": "", "name": "subscription-manager", "version": "1.29.47.1-1.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "PxTtNNt6Us8EraFZluI++g==": { "id": "PxTtNNt6Us8EraFZluI++g==", "name": "httpd-tools", "version": "2.4.62-7.el9_7.3", "kind": "binary", "source": { "id": "", "name": "httpd", "version": "2.4.62-7.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Q4EH8dHdml+oN5T9LssIRw==": { "id": "Q4EH8dHdml+oN5T9LssIRw==", "name": "gettext-libs", "version": "0.21-8.el9", "kind": "binary", "source": { "id": "", "name": "gettext", "version": "0.21-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Q8V6CJq+uIfjVUujX4I61Q==": { "id": "Q8V6CJq+uIfjVUujX4I61Q==", "name": "pcre2-utf32", "version": "10.40-6.el9", "kind": "binary", "source": { "id": "", "name": "pcre2", "version": "10.40-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "QXZqh0qx9Vk+bcSACeoTQg==": { "id": "QXZqh0qx9Vk+bcSACeoTQg==", "name": "systemd-pam", "version": "252-55.el9_7.7", "kind": "binary", "source": { "id": "", "name": "systemd", "version": "252-55.el9_7.7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "QcXiQZ6UKeueoaxjtrYKog==": { "id": "QcXiQZ6UKeueoaxjtrYKog==", "name": "perl-Symbol", "version": "1.08-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "Qk1bxbjfumdXF7/eZ6qhuw==": { "id": "Qk1bxbjfumdXF7/eZ6qhuw==", "name": "less", "version": "590-6.el9", "kind": "binary", "source": { "id": "", "name": "less", "version": "590-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "QlHijPVbW9yTtx/mAeIhAg==": { "id": "QlHijPVbW9yTtx/mAeIhAg==", "name": "python3-dnf", "version": "4.14.0-31.el9", "kind": "binary", "source": { "id": "", "name": "dnf", "version": "4.14.0-31.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "QpWwMw97N/44PyIvwMh0cA==": { "id": "QpWwMw97N/44PyIvwMh0cA==", "name": "perl-interpreter", "version": "4:5.32.1-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "R9sC7SuM6vJmJZYq/bMHWw==": { "id": "R9sC7SuM6vJmJZYq/bMHWw==", "name": "m4", "version": "1.4.19-1.el9", "kind": "binary", "source": { "id": "", "name": "m4", "version": "1.4.19-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "RH5gHxMLfgSMn5ktJt/VXA==": { "id": "RH5gHxMLfgSMn5ktJt/VXA==", "name": "psmisc", "version": "23.4-3.el9", "kind": "binary", "source": { "id": "", "name": "psmisc", "version": "23.4-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "RIdJTslNAIfH4yKbDsoK9Q==": { "id": "RIdJTslNAIfH4yKbDsoK9Q==", "name": "redhat-release", "version": "9.7-0.7.el9", "kind": "binary", "source": { "id": "", "name": "redhat-release", "version": "9.7-0.7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "RXh3fimX8fGZeCt4chJEiA==": { "id": "RXh3fimX8fGZeCt4chJEiA==", "name": "librhsm", "version": "0.0.3-9.el9", "kind": "binary", "source": { "id": "", "name": "librhsm", "version": "0.0.3-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "RYlcnK5aDkYpG2HTfkwNDQ==": { "id": "RYlcnK5aDkYpG2HTfkwNDQ==", "name": "enchant", "version": "1:1.6.0-30.el9", "kind": "binary", "source": { "id": "", "name": "enchant", "version": "1.6.0-30.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Rmp+/J0Vf6Z1c/jUFbiVFw==": { "id": "Rmp+/J0Vf6Z1c/jUFbiVFw==", "name": "gdb", "version": "16.3-2.el9", "kind": "binary", "source": { "id": "", "name": "gdb", "version": "16.3-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "RmtwCYp+M3KMl7TiyHKwMA==": { "id": "RmtwCYp+M3KMl7TiyHKwMA==", "name": "pcre2-devel", "version": "10.40-6.el9", "kind": "binary", "source": { "id": "", "name": "pcre2", "version": "10.40-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "S06XRLxcmWWQsefRiwpIrg==": { "id": "S06XRLxcmWWQsefRiwpIrg==", "name": "sscg", "version": "3.0.0-10.el9", "kind": "binary", "source": { "id": "", "name": "sscg", "version": "3.0.0-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "S3/WQXqKyyY/T07YqHeeYg==": { "id": "S3/WQXqKyyY/T07YqHeeYg==", "name": "libblkid-devel", "version": "2.37.4-21.el9_7", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "S7oZGbo6zhW2tPnf4bdYAg==": { "id": "S7oZGbo6zhW2tPnf4bdYAg==", "name": "hunspell", "version": "1.7.0-11.el9", "kind": "binary", "source": { "id": "", "name": "hunspell", "version": "1.7.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "S8p9UGak1oycptcpYp/1eg==": { "id": "S8p9UGak1oycptcpYp/1eg==", "name": "openldap", "version": "2.6.8-4.el9", "kind": "binary", "source": { "id": "", "name": "openldap", "version": "2.6.8-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "SDcVZRLpwAQNjUwZ+PuxkA==": { "id": "SDcVZRLpwAQNjUwZ+PuxkA==", "name": "freetype-devel", "version": "2.10.4-10.el9_5", "kind": "binary", "source": { "id": "", "name": "freetype", "version": "2.10.4-10.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "SZllfeGD2yJm0VL0H7onLg==": { "id": "SZllfeGD2yJm0VL0H7onLg==", "name": "libxcb-devel", "version": "1.13.1-9.el9", "kind": "binary", "source": { "id": "", "name": "libxcb", "version": "1.13.1-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ScSZYXWuosUrTT47e6vL3g==": { "id": "ScSZYXWuosUrTT47e6vL3g==", "name": "emacs-filesystem", "version": "1:27.2-18.el9", "kind": "binary", "source": { "id": "", "name": "emacs", "version": "27.2-18.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "SsUshR21MZuli8B+sjKoRg==": { "id": "SsUshR21MZuli8B+sjKoRg==", "name": "perl-File-Basename", "version": "2.85-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "Su8bfW9ijc0V5CiAum2V1g==": { "id": "Su8bfW9ijc0V5CiAum2V1g==", "name": "bzip2-libs", "version": "1.0.8-10.el9_5", "kind": "binary", "source": { "id": "", "name": "bzip2", "version": "1.0.8-10.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "TPIRq84Pr3a6ywzPeCr3Pw==": { "id": "TPIRq84Pr3a6ywzPeCr3Pw==", "name": "libcap-ng", "version": "0.8.2-7.el9", "kind": "binary", "source": { "id": "", "name": "libcap-ng", "version": "0.8.2-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "TSs+KS9B9pkzz7FIgxu+aw==": { "id": "TSs+KS9B9pkzz7FIgxu+aw==", "name": "wget", "version": "1.21.1-8.el9_4", "kind": "binary", "source": { "id": "", "name": "wget", "version": "1.21.1-8.el9_4", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "TkXCvcN2A46dE6BjW9IROw==": { "id": "TkXCvcN2A46dE6BjW9IROw==", "name": "mod_http2", "version": "2.0.26-5.el9", "kind": "binary", "source": { "id": "", "name": "mod_http2", "version": "2.0.26-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "To0NR+oyXDu1CYJfmVGurQ==": { "id": "To0NR+oyXDu1CYJfmVGurQ==", "name": "gpgme", "version": "1.15.1-6.el9", "kind": "binary", "source": { "id": "", "name": "gpgme", "version": "1.15.1-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "U36pUJLPuq0PwTe+al8muQ==": { "id": "U36pUJLPuq0PwTe+al8muQ==", "name": "kernel-headers", "version": "5.14.0-611.30.1.el9_7", "kind": "binary", "source": { "id": "", "name": "kernel", "version": "5.14.0-611.30.1.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "UCztdZ6zzlJMAH60k5rqRA==": { "id": "UCztdZ6zzlJMAH60k5rqRA==", "name": "openssl", "version": "1:3.5.1-7.el9_7", "kind": "binary", "source": { "id": "", "name": "openssl", "version": "3.5.1-7.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "UFOUWXspgJlx00D0q0rCUg==": { "id": "UFOUWXspgJlx00D0q0rCUg==", "name": "hunspell-en-GB", "version": "0.20140811.1-20.el9", "kind": "binary", "source": { "id": "", "name": "hunspell-en", "version": "0.20140811.1-20.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "UPcwub579LDL6kq2lq/xZw==": { "id": "UPcwub579LDL6kq2lq/xZw==", "name": "harfbuzz-devel", "version": "2.7.4-10.el9", "kind": "binary", "source": { "id": "", "name": "harfbuzz", "version": "2.7.4-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "UPrK58zHez+Qpcz+vYl5Wg==": { "id": "UPrK58zHez+Qpcz+vYl5Wg==", "name": "apr-util-ldap", "version": "1.6.1-23.el9", "kind": "binary", "source": { "id": "", "name": "apr-util", "version": "1.6.1-23.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "UTNN7VK61RHl/IW+g5aMJA==": { "id": "UTNN7VK61RHl/IW+g5aMJA==", "name": "libjpeg-turbo", "version": "2.0.90-7.el9", "kind": "binary", "source": { "id": "", "name": "libjpeg-turbo", "version": "2.0.90-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "UWXJUZfGCJSFYUff3zhl3g==": { "id": "UWXJUZfGCJSFYUff3zhl3g==", "name": "dmidecode", "version": "1:3.6-1.el9", "kind": "binary", "source": { "id": "", "name": "dmidecode", "version": "3.6-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "UcGy2+DIOqObBfK9GBmDEw==": { "id": "UcGy2+DIOqObBfK9GBmDEw==", "name": "python-srpm-macros", "version": "3.9-54.el9", "kind": "binary", "source": { "id": "", "name": "python-rpm-macros", "version": "3.9-54.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "UnaL8VteZLsad5rFJhaXcw==": { "id": "UnaL8VteZLsad5rFJhaXcw==", "name": "python3-rpm", "version": "4.16.1.3-39.el9", "kind": "binary", "source": { "id": "", "name": "rpm", "version": "4.16.1.3-39.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "UsCVnGtHcj2ZvesjLLcG6Q==": { "id": "UsCVnGtHcj2ZvesjLLcG6Q==", "name": "importlib_metadata", "version": "8.7.1", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.8.7.1.0.0.0.0.0.0", "cpe": "" }, "VPMvwiwbrTXjPkPpxmP3sw==": { "id": "VPMvwiwbrTXjPkPpxmP3sw==", "name": "acl", "version": "2.3.1-4.el9", "kind": "binary", "source": { "id": "", "name": "acl", "version": "2.3.1-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "VV2Z1ngTs6sGvt5SrayPCg==": { "id": "VV2Z1ngTs6sGvt5SrayPCg==", "name": "libgpg-error", "version": "1.42-5.el9", "kind": "binary", "source": { "id": "", "name": "libgpg-error", "version": "1.42-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "VX9V+Y680L2xf2tBREdpCw==": { "id": "VX9V+Y680L2xf2tBREdpCw==", "name": "gmp", "version": "1:6.2.0-13.el9", "kind": "binary", "source": { "id": "", "name": "gmp", "version": "6.2.0-13.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "VhjrPOGZ9XGEFgLnQWc+KQ==": { "id": "VhjrPOGZ9XGEFgLnQWc+KQ==", "name": "perl-Text-Tabs+Wrap", "version": "2013.0523-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-Text-Tabs+Wrap", "version": "2013.0523-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "W7uBqJb8l9AhSXjNg1JZQg==": { "id": "W7uBqJb8l9AhSXjNg1JZQg==", "name": "ncurses-libs", "version": "6.2-12.20210508.el9", "kind": "binary", "source": { "id": "", "name": "ncurses", "version": "6.2-12.20210508.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "WKZFJYHmPo5x9c8JUEnETA==": { "id": "WKZFJYHmPo5x9c8JUEnETA==", "name": "glib2", "version": "2.68.4-18.el9_7.1", "kind": "binary", "source": { "id": "", "name": "glib2", "version": "2.68.4-18.el9_7.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "WQqPFo8Asn86tAeRqCxr1w==": { "id": "WQqPFo8Asn86tAeRqCxr1w==", "name": "perl-IPC-Open3", "version": "1.21-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "WVajSGKLGm8z6I23XYAhLQ==": { "id": "WVajSGKLGm8z6I23XYAhLQ==", "name": "cyrus-sasl-lib", "version": "2.1.27-22.el9", "kind": "binary", "source": { "id": "", "name": "cyrus-sasl", "version": "2.1.27-22.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "WifWl02dLM2pp5urxOSuNg==": { "id": "WifWl02dLM2pp5urxOSuNg==", "name": "perl-URI", "version": "5.09-3.el9", "kind": "binary", "source": { "id": "", "name": "perl-URI", "version": "5.09-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "WzYxymAFFZiduGsTG/o8gA==": { "id": "WzYxymAFFZiduGsTG/o8gA==", "name": "attr", "version": "2.5.1-3.el9", "kind": "binary", "source": { "id": "", "name": "attr", "version": "2.5.1-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XG5+bW8np2NedSy/od6z8Q==": { "id": "XG5+bW8np2NedSy/od6z8Q==", "name": "libacl", "version": "2.3.1-4.el9", "kind": "binary", "source": { "id": "", "name": "acl", "version": "2.3.1-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XGaIL7YJmyr8vz8ETC4dAA==": { "id": "XGaIL7YJmyr8vz8ETC4dAA==", "name": "perl-IO", "version": "1.43-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XIcr6HdP94Dud7DtFrfMZg==": { "id": "XIcr6HdP94Dud7DtFrfMZg==", "name": "libcap", "version": "2.48-10.el9", "kind": "binary", "source": { "id": "", "name": "libcap", "version": "2.48-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XMI2bnJZdxdcHnKc3zgCUA==": { "id": "XMI2bnJZdxdcHnKc3zgCUA==", "name": "ghc-srpm-macros", "version": "1.5.0-6.el9", "kind": "binary", "source": { "id": "", "name": "ghc-srpm-macros", "version": "1.5.0-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "XP0LiIWbLisoI52ZCyFcLg==": { "id": "XP0LiIWbLisoI52ZCyFcLg==", "name": "libXpm-devel", "version": "3.5.13-10.el9", "kind": "binary", "source": { "id": "", "name": "libXpm", "version": "3.5.13-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XTnX2VddNvCYpYt/meLgYA==": { "id": "XTnX2VddNvCYpYt/meLgYA==", "name": "libxslt", "version": "1.1.34-13.el9_6", "kind": "binary", "source": { "id": "", "name": "libxslt", "version": "1.1.34-13.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XgE+qDogkObCc5XPQHN25A==": { "id": "XgE+qDogkObCc5XPQHN25A==", "name": "python3-cloud-what", "version": "1.29.47.1-1.el9_7", "kind": "binary", "source": { "id": "", "name": "subscription-manager", "version": "1.29.47.1-1.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "XliA1VgMzM5VjjSZdnmlQw==": { "id": "XliA1VgMzM5VjjSZdnmlQw==", "name": "perl-Getopt-Long", "version": "1:2.52-4.el9", "kind": "binary", "source": { "id": "", "name": "perl-Getopt-Long", "version": "2.52-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "XwbkaIGCYyq6BjBMVZ1wzw==": { "id": "XwbkaIGCYyq6BjBMVZ1wzw==", "name": "readline", "version": "8.1-4.el9", "kind": "binary", "source": { "id": "", "name": "readline", "version": "8.1-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "Y35yrxWjtTUkUbNtS9+p6g==": { "id": "Y35yrxWjtTUkUbNtS9+p6g==", "name": "python3-six", "version": "1.15.0-9.el9", "kind": "binary", "source": { "id": "", "name": "python-six", "version": "1.15.0-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "Y5PnxdiaM8nGZKt9U6sMKw==": { "id": "Y5PnxdiaM8nGZKt9U6sMKw==", "name": "pcre-cpp", "version": "8.44-4.el9", "kind": "binary", "source": { "id": "", "name": "pcre", "version": "8.44-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "YfEo6WVMrrTwiYOybxFFKg==": { "id": "YfEo6WVMrrTwiYOybxFFKg==", "name": "atlas", "version": "3.10.3-17.el9", "kind": "binary", "source": { "id": "", "name": "atlas", "version": "3.10.3-17.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "YuMHdRatKmZ56mnoWUwdqw==": { "id": "YuMHdRatKmZ56mnoWUwdqw==", "name": "perl-Git", "version": "2.47.3-1.el9_6", "kind": "binary", "source": { "id": "", "name": "git", "version": "2.47.3-1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "ZTHevSGB8avmV9Ng4Dpgvg==": { "id": "ZTHevSGB8avmV9Ng4Dpgvg==", "name": "libdb-devel", "version": "5.3.28-57.el9_6", "kind": "binary", "source": { "id": "", "name": "libdb", "version": "5.3.28-57.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ZX4vKkXsoMfQ2HH9oPb0TA==": { "id": "ZX4vKkXsoMfQ2HH9oPb0TA==", "name": "libXau-devel", "version": "1.0.9-8.el9", "kind": "binary", "source": { "id": "", "name": "libXau", "version": "1.0.9-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "aJNccc76ay90akro/A82ww==": { "id": "aJNccc76ay90akro/A82ww==", "name": "python3-systemd", "version": "234-19.el9", "kind": "binary", "source": { "id": "", "name": "python-systemd", "version": "234-19.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "aVZ2bh2CbtumQqaoGUZ8hA==": { "id": "aVZ2bh2CbtumQqaoGUZ8hA==", "name": "libcurl-minimal", "version": "7.76.1-35.el9_7.3", "kind": "binary", "source": { "id": "", "name": "curl", "version": "7.76.1-35.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "afL/h/3XzYq6me3BTaFWlA==": { "id": "afL/h/3XzYq6me3BTaFWlA==", "name": "libdnf-plugin-subscription-manager", "version": "1.29.47.1-1.el9_7", "kind": "binary", "source": { "id": "", "name": "subscription-manager", "version": "1.29.47.1-1.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "al0lbET4LJsNSGMw0pP5wg==": { "id": "al0lbET4LJsNSGMw0pP5wg==", "name": "libjpeg-turbo-devel", "version": "2.0.90-7.el9", "kind": "binary", "source": { "id": "", "name": "libjpeg-turbo", "version": "2.0.90-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "arLt5War9yeQ8auYn/Idmw==": { "id": "arLt5War9yeQ8auYn/Idmw==", "name": "nettle", "version": "3.10.1-1.el9", "kind": "binary", "source": { "id": "", "name": "nettle", "version": "3.10.1-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "b1AC06/TSkB/tmj5EJU3Wg==": { "id": "b1AC06/TSkB/tmj5EJU3Wg==", "name": "libtalloc", "version": "2.4.3-1.el9", "kind": "binary", "source": { "id": "", "name": "libtalloc", "version": "2.4.3-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "bEsPytE/ZdCMbfuAgQc9AA==": { "id": "bEsPytE/ZdCMbfuAgQc9AA==", "name": "perl-srpm-macros", "version": "1-41.el9", "kind": "binary", "source": { "id": "", "name": "perl-srpm-macros", "version": "1-41.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "bFvWffGqJWr7FWnI7K9NVw==": { "id": "bFvWffGqJWr7FWnI7K9NVw==", "name": "grep", "version": "3.6-5.el9", "kind": "binary", "source": { "id": "", "name": "grep", "version": "3.6-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "bJpkI/9naqJZmJnxkKD+fQ==": { "id": "bJpkI/9naqJZmJnxkKD+fQ==", "name": "systemd-libs", "version": "252-55.el9_7.7", "kind": "binary", "source": { "id": "", "name": "systemd", "version": "252-55.el9_7.7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "bemGVBhbDe9iV1Kjvd9hAA==": { "id": "bemGVBhbDe9iV1Kjvd9hAA==", "name": "libffi", "version": "3.4.2-8.el9", "kind": "binary", "source": { "id": "", "name": "libffi", "version": "3.4.2-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "c08XsIFt/fm6inf2p0ZG8A==": { "id": "c08XsIFt/fm6inf2p0ZG8A==", "name": "tar", "version": "2:1.34-9.el9_7", "kind": "binary", "source": { "id": "", "name": "tar", "version": "1.34-9.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "cHAJILwEV0OAQcBBnKqncg==": { "id": "cHAJILwEV0OAQcBBnKqncg==", "name": "elfutils-default-yama-scope", "version": "0.193-1.el9", "kind": "binary", "source": { "id": "", "name": "elfutils", "version": "0.193-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "cW4NTPGLvYpE6hhT8bNZrQ==": { "id": "cW4NTPGLvYpE6hhT8bNZrQ==", "name": "apr-util", "version": "1.6.1-23.el9", "kind": "binary", "source": { "id": "", "name": "apr-util", "version": "1.6.1-23.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "cZtZpGQDMJ8/qYUdQbgb3Q==": { "id": "cZtZpGQDMJ8/qYUdQbgb3Q==", "name": "glibc-headers", "version": "2.34-231.el9_7.2", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-231.el9_7.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "cgBLWdUd4/YcvkaTWAC3Pg==": { "id": "cgBLWdUd4/YcvkaTWAC3Pg==", "name": "binutils-gold", "version": "2.35.2-67.el9_7.1", "kind": "binary", "source": { "id": "", "name": "binutils", "version": "2.35.2-67.el9_7.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "cpIirH9DE6nFQZA6wIpxLg==": { "id": "cpIirH9DE6nFQZA6wIpxLg==", "name": "gdb-gdbserver", "version": "16.3-2.el9", "kind": "binary", "source": { "id": "", "name": "gdb", "version": "16.3-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ct/ndQfSB+G17YP34ufDBA==": { "id": "ct/ndQfSB+G17YP34ufDBA==", "name": "perl-Digest-MD5", "version": "2.58-4.el9", "kind": "binary", "source": { "id": "", "name": "perl-Digest-MD5", "version": "2.58-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "d2u6OOcV0gny9xb/XcV90A==": { "id": "d2u6OOcV0gny9xb/XcV90A==", "name": "libverto-devel", "version": "0.3.2-3.el9", "kind": "binary", "source": { "id": "", "name": "libverto", "version": "0.3.2-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "dBKXgz7fNBsMAqmGTkj8sQ==": { "id": "dBKXgz7fNBsMAqmGTkj8sQ==", "name": "freetype", "version": "2.10.4-10.el9_5", "kind": "binary", "source": { "id": "", "name": "freetype", "version": "2.10.4-10.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "dC9CoYt17eaqinGSVCfCxw==": { "id": "dC9CoYt17eaqinGSVCfCxw==", "name": "libattr", "version": "2.5.1-3.el9", "kind": "binary", "source": { "id": "", "name": "attr", "version": "2.5.1-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "dH7n2Ct/z7JALFNo9SCMDg==": { "id": "dH7n2Ct/z7JALFNo9SCMDg==", "name": "gdb-headless", "version": "16.3-2.el9", "kind": "binary", "source": { "id": "", "name": "gdb", "version": "16.3-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "dchXRtdYUnsIeCwGm4Ct8Q==": { "id": "dchXRtdYUnsIeCwGm4Ct8Q==", "name": "openldap-devel", "version": "2.6.8-4.el9", "kind": "binary", "source": { "id": "", "name": "openldap", "version": "2.6.8-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "de44cUqF23LvU0fOSvNRjA==": { "id": "de44cUqF23LvU0fOSvNRjA==", "name": "libevent", "version": "2.1.12-8.el9_4", "kind": "binary", "source": { "id": "", "name": "libevent", "version": "2.1.12-8.el9_4", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "dj7DwOHHHI+8+9QuzFaSUA==": { "id": "dj7DwOHHHI+8+9QuzFaSUA==", "name": "keyutils", "version": "1.6.3-1.el9", "kind": "binary", "source": { "id": "", "name": "keyutils", "version": "1.6.3-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "dpQG/pUwAqVv1OdQqnvylQ==": { "id": "dpQG/pUwAqVv1OdQqnvylQ==", "name": "libsigsegv", "version": "2.13-4.el9", "kind": "binary", "source": { "id": "", "name": "libsigsegv", "version": "2.13-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "e+CtHsEaBCLbHEFWXwHRyg==": { "id": "e+CtHsEaBCLbHEFWXwHRyg==", "name": "perl-base", "version": "2.27-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "e40n/77uWc/t2R+0m7WchA==": { "id": "e40n/77uWc/t2R+0m7WchA==", "name": "glibc-common", "version": "2.34-231.el9_7.2", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-231.el9_7.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "e7W78NrdwYaVEcBcXhDv5Q==": { "id": "e7W78NrdwYaVEcBcXhDv5Q==", "name": "libcomps", "version": "0.1.18-1.el9", "kind": "binary", "source": { "id": "", "name": "libcomps", "version": "0.1.18-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "e9e6iwwufr2qvMYpuZgq7Q==": { "id": "e9e6iwwufr2qvMYpuZgq7Q==", "name": "elfutils-libs", "version": "0.193-1.el9", "kind": "binary", "source": { "id": "", "name": "elfutils", "version": "0.193-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "eEjpOxWkwvzzJN5kkeVUcg==": { "id": "eEjpOxWkwvzzJN5kkeVUcg==", "name": "perl-Encode", "version": "4:3.08-462.el9", "kind": "binary", "source": { "id": "", "name": "perl-Encode", "version": "3.08-462.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "eRa7MZyiHBvsv7GPhkGKdg==": { "id": "eRa7MZyiHBvsv7GPhkGKdg==", "name": "lua-libs", "version": "5.4.4-4.el9", "kind": "binary", "source": { "id": "", "name": "lua", "version": "5.4.4-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ejmVM2MTGmDkkntlZCpYEw==": { "id": "ejmVM2MTGmDkkntlZCpYEw==", "name": "dbus-common", "version": "1:1.12.20-8.el9", "kind": "binary", "source": { "id": "", "name": "dbus", "version": "1.12.20-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "enagVWadN12gI5iPYugyvg==": { "id": "enagVWadN12gI5iPYugyvg==", "name": "gnupg2", "version": "2.3.3-5.el9_7", "kind": "binary", "source": { "id": "", "name": "gnupg2", "version": "2.3.3-5.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ev4LjEwclLnf3ehIi3l8oA==": { "id": "ev4LjEwclLnf3ehIi3l8oA==", "name": "sqlite-libs", "version": "3.34.1-9.el9_7", "kind": "binary", "source": { "id": "", "name": "sqlite", "version": "3.34.1-9.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ewbqmzgK8Rzf739yT7IKUQ==": { "id": "ewbqmzgK8Rzf739yT7IKUQ==", "name": "ncurses-base", "version": "6.2-12.20210508.el9", "kind": "binary", "source": { "id": "", "name": "ncurses", "version": "6.2-12.20210508.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "f2GhXCi0MGW6C5vh1ih8XQ==": { "id": "f2GhXCi0MGW6C5vh1ih8XQ==", "name": "perl-threads", "version": "1:2.25-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-threads", "version": "2.25-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "f3K2r1U+QmHjsUiML4ziOQ==": { "id": "f3K2r1U+QmHjsUiML4ziOQ==", "name": "perl-subs", "version": "1.03-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "f86Wc3apFCnJqkXk60X7Cw==": { "id": "f86Wc3apFCnJqkXk60X7Cw==", "name": "git", "version": "2.47.3-1.el9_6", "kind": "binary", "source": { "id": "", "name": "git", "version": "2.47.3-1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "fMAVuEMmdAgbIa7mBMTdbg==": { "id": "fMAVuEMmdAgbIa7mBMTdbg==", "name": "systemd", "version": "252-55.el9_7.7", "kind": "binary", "source": { "id": "", "name": "systemd", "version": "252-55.el9_7.7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "fPqd9vZ8gX6ENS8pJ4Xrwg==": { "id": "fPqd9vZ8gX6ENS8pJ4Xrwg==", "name": "libxcrypt-compat", "version": "4.4.18-3.el9", "kind": "binary", "source": { "id": "", "name": "libxcrypt", "version": "4.4.18-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "gBWlSWdEA8U1+Ep4A/+M2g==": { "id": "gBWlSWdEA8U1+Ep4A/+M2g==", "name": "perl-Error", "version": "1:0.17029-7.el9", "kind": "binary", "source": { "id": "", "name": "perl-Error", "version": "0.17029-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "gJHwCqer7Rl9ijGK6wpg4A==": { "id": "gJHwCqer7Rl9ijGK6wpg4A==", "name": "libICE", "version": "1.0.10-8.el9", "kind": "binary", "source": { "id": "", "name": "libICE", "version": "1.0.10-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "gngAZQYf0zy4+w3GwgpLmw==": { "id": "gngAZQYf0zy4+w3GwgpLmw==", "name": "python3-libcomps", "version": "0.1.18-1.el9", "kind": "binary", "source": { "id": "", "name": "libcomps", "version": "0.1.18-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "gsKPriszRNKAqMnHK+dXgw==": { "id": "gsKPriszRNKAqMnHK+dXgw==", "name": "libksba", "version": "1.5.1-7.el9", "kind": "binary", "source": { "id": "", "name": "libksba", "version": "1.5.1-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "h7PT3q6O99+SW5+YBpMkiw==": { "id": "h7PT3q6O99+SW5+YBpMkiw==", "name": "libcurl-devel", "version": "7.76.1-35.el9_7.3", "kind": "binary", "source": { "id": "", "name": "curl", "version": "7.76.1-35.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "hKJ3xmpaes4B2vxd2C5M1Q==": { "id": "hKJ3xmpaes4B2vxd2C5M1Q==", "name": "ocaml-srpm-macros", "version": "6-6.el9", "kind": "binary", "source": { "id": "", "name": "ocaml-srpm-macros", "version": "6-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "hPT49yps+Z9jsLD3fRSPrg==": { "id": "hPT49yps+Z9jsLD3fRSPrg==", "name": "boost-regex", "version": "1.75.0-13.el9_7", "kind": "binary", "source": { "id": "", "name": "boost", "version": "1.75.0-13.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "hYEisV19Dxn4PvCvxJFm5A==": { "id": "hYEisV19Dxn4PvCvxJFm5A==", "name": "lz4-libs", "version": "1.9.3-5.el9", "kind": "binary", "source": { "id": "", "name": "lz4", "version": "1.9.3-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "hgsVhmCR+D+pPaE1yMWDsg==": { "id": "hgsVhmCR+D+pPaE1yMWDsg==", "name": "libicu-devel", "version": "67.1-10.el9_6", "kind": "binary", "source": { "id": "", "name": "icu", "version": "67.1-10.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "hjikQWtnmVPaWts63wYw4Q==": { "id": "hjikQWtnmVPaWts63wYw4Q==", "name": "passwd", "version": "0.80-12.el9", "kind": "binary", "source": { "id": "", "name": "passwd", "version": "0.80-12.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "hktk4wXij5O6pY5X6Pdp/Q==": { "id": "hktk4wXij5O6pY5X6Pdp/Q==", "name": "elfutils-debuginfod-client", "version": "0.193-1.el9", "kind": "binary", "source": { "id": "", "name": "elfutils", "version": "0.193-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "iMLMqCcRXnm6QslpJnCS7w==": { "id": "iMLMqCcRXnm6QslpJnCS7w==", "name": "cairo", "version": "1.17.4-7.el9", "kind": "binary", "source": { "id": "", "name": "cairo", "version": "1.17.4-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "iQByZpdRXgW/fl3SoDuoAA==": { "id": "iQByZpdRXgW/fl3SoDuoAA==", "name": "libipt", "version": "2.0.4-5.el9", "kind": "binary", "source": { "id": "", "name": "libipt", "version": "2.0.4-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "iXL2XPVys02jHcobuV/7zQ==": { "id": "iXL2XPVys02jHcobuV/7zQ==", "name": "libfdisk", "version": "2.37.4-21.el9_7", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ipG1YUFrN7KyPdU8o+2M6Q==": { "id": "ipG1YUFrN7KyPdU8o+2M6Q==", "name": "libicu", "version": "67.1-10.el9_6", "kind": "binary", "source": { "id": "", "name": "icu", "version": "67.1-10.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "irdTBCwmsDefJyVDw+cS3A==": { "id": "irdTBCwmsDefJyVDw+cS3A==", "name": "ima-evm-utils", "version": "1.6.2-2.el9", "kind": "binary", "source": { "id": "", "name": "ima-evm-utils", "version": "1.6.2-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "iswhVSntR4QnIsTAyM6ydQ==": { "id": "iswhVSntR4QnIsTAyM6ydQ==", "name": "perl-Pod-Escapes", "version": "1:1.07-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-Pod-Escapes", "version": "1.07-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "it/1dAj/Yqoy0694vv9wUA==": { "id": "it/1dAj/Yqoy0694vv9wUA==", "name": "httpd", "version": "2.4.62-7.el9_7.3", "kind": "binary", "source": { "id": "", "name": "httpd", "version": "2.4.62-7.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ix3lD4/Nn7qLbcpDm0AIhg==": { "id": "ix3lD4/Nn7qLbcpDm0AIhg==", "name": "perl-constant", "version": "1.33-461.el9", "kind": "binary", "source": { "id": "", "name": "perl-constant", "version": "1.33-461.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "j+mzBjs+9Rp1lGL7uVd5sA==": { "id": "j+mzBjs+9Rp1lGL7uVd5sA==", "name": "llvm-libs", "version": "20.1.8-3.el9", "kind": "binary", "source": { "id": "", "name": "llvm", "version": "20.1.8-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "j5BITKK/PhtJBhR0Qn0Ziw==": { "id": "j5BITKK/PhtJBhR0Qn0Ziw==", "name": "nodejs", "version": "1:22.19.0-2.module+el9.7.0+23475+0a960596", "kind": "binary", "source": { "id": "", "name": "nodejs", "version": "22.19.0-2.module+el9.7.0+23475+0a960596", "kind": "source", "normalized_version": "", "module": "nodejs:22", "cpe": "" }, "normalized_version": "", "module": "nodejs:22", "arch": "x86_64", "cpe": "" }, "j5f/exLQUf/AfnuQvtw1ag==": { "id": "j5f/exLQUf/AfnuQvtw1ag==", "name": "perl-overload", "version": "1.31-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "jAjaNW7NMGiv7HfByDu4RQ==": { "id": "jAjaNW7NMGiv7HfByDu4RQ==", "name": "alternatives", "version": "1.24-2.el9", "kind": "binary", "source": { "id": "", "name": "chkconfig", "version": "1.24-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "jDIVpAdvhjPN/gmOBNQuag==": { "id": "jDIVpAdvhjPN/gmOBNQuag==", "name": "perl-Time-Local", "version": "2:1.300-7.el9", "kind": "binary", "source": { "id": "", "name": "perl-Time-Local", "version": "1.300-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "jH43ZEoPP2TpNiUJXUizMw==": { "id": "jH43ZEoPP2TpNiUJXUizMw==", "name": "libutempter", "version": "1.2.1-6.el9", "kind": "binary", "source": { "id": "", "name": "libutempter", "version": "1.2.1-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "jMxy8GAhrrA2mTT5vqlfcg==": { "id": "jMxy8GAhrrA2mTT5vqlfcg==", "name": "gcc", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "jXo3rXdhdYGkiXYZpQxZ3Q==": { "id": "jXo3rXdhdYGkiXYZpQxZ3Q==", "name": "python3-chardet", "version": "4.0.0-5.el9", "kind": "binary", "source": { "id": "", "name": "python-chardet", "version": "4.0.0-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "jrYNd66NtmHdHhjnoxRx/A==": { "id": "jrYNd66NtmHdHhjnoxRx/A==", "name": "perl-FileHandle", "version": "2.03-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "jxodkkAvUPklQOkQf5mRGQ==": { "id": "jxodkkAvUPklQOkQf5mRGQ==", "name": "openssl-libs", "version": "1:3.5.1-7.el9_7", "kind": "binary", "source": { "id": "", "name": "openssl", "version": "3.5.1-7.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "k0H4b6XNielCqxta/CRiLQ==": { "id": "k0H4b6XNielCqxta/CRiLQ==", "name": "krb5-devel", "version": "1.21.1-8.el9_6", "kind": "binary", "source": { "id": "", "name": "krb5", "version": "1.21.1-8.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "kDzRHkg3txncDWuyd5771g==": { "id": "kDzRHkg3txncDWuyd5771g==", "name": "fontconfig", "version": "2.14.0-2.el9_1", "kind": "binary", "source": { "id": "", "name": "fontconfig", "version": "2.14.0-2.el9_1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "kFxhSjWy84mTZBM4XiZaeQ==": { "id": "kFxhSjWy84mTZBM4XiZaeQ==", "name": "setup", "version": "2.13.7-10.el9", "kind": "binary", "source": { "id": "", "name": "setup", "version": "2.13.7-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "kUBCI82medWnoqu0XgvJJg==": { "id": "kUBCI82medWnoqu0XgvJJg==", "name": "openssh-clients", "version": "8.7p1-47.el9_7", "kind": "binary", "source": { "id": "", "name": "openssh", "version": "8.7p1-47.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "kaLLRnNrSxtvkSdcliuniA==": { "id": "kaLLRnNrSxtvkSdcliuniA==", "name": "curl-minimal", "version": "7.76.1-35.el9_7.3", "kind": "binary", "source": { "id": "", "name": "curl", "version": "7.76.1-35.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "kigiD4fuysu8/DeCr+ONKQ==": { "id": "kigiD4fuysu8/DeCr+ONKQ==", "name": "basesystem", "version": "11-13.el9", "kind": "binary", "source": { "id": "", "name": "basesystem", "version": "11-13.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "kp6BaioAZ30jbVeZkkzokA==": { "id": "kp6BaioAZ30jbVeZkkzokA==", "name": "libzstd", "version": "1.5.5-1.el9", "kind": "binary", "source": { "id": "", "name": "zstd", "version": "1.5.5-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "kqjucdtmnvYZVSGwSyc0aA==": { "id": "kqjucdtmnvYZVSGwSyc0aA==", "name": "iproute", "version": "6.14.0-2.el9", "kind": "binary", "source": { "id": "", "name": "iproute", "version": "6.14.0-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "l/3ul+K857h8xvvKgPPc8A==": { "id": "l/3ul+K857h8xvvKgPPc8A==", "name": "cyrus-sasl", "version": "2.1.27-22.el9", "kind": "binary", "source": { "id": "", "name": "cyrus-sasl", "version": "2.1.27-22.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "l36Y8lL0dC04c9AnKIpOCw==": { "id": "l36Y8lL0dC04c9AnKIpOCw==", "name": "perl-vars", "version": "1.05-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "lIAKRJe70medmtteiMTNkw==": { "id": "lIAKRJe70medmtteiMTNkw==", "name": "binutils", "version": "2.35.2-67.el9_7.1", "kind": "binary", "source": { "id": "", "name": "binutils", "version": "2.35.2-67.el9_7.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "lNWcYbl6h71sUZV6B4E+bw==": { "id": "lNWcYbl6h71sUZV6B4E+bw==", "name": "pkgconf-m4", "version": "1.7.3-10.el9", "kind": "binary", "source": { "id": "", "name": "pkgconf", "version": "1.7.3-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "lV2MRz2nTh21rS47LJ6XIQ==": { "id": "lV2MRz2nTh21rS47LJ6XIQ==", "name": "python3-pip-wheel", "version": "21.3.1-1.el9", "kind": "binary", "source": { "id": "", "name": "python-pip", "version": "21.3.1-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "lbcitH3ttNejz+IVDee9kA==": { "id": "lbcitH3ttNejz+IVDee9kA==", "name": "dnf-data", "version": "4.14.0-31.el9", "kind": "binary", "source": { "id": "", "name": "dnf", "version": "4.14.0-31.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "lqKUNuoxzC8zSaSnPi26WQ==": { "id": "lqKUNuoxzC8zSaSnPi26WQ==", "name": "perl-overloading", "version": "0.02-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "m0hcMUeRLwmMKjncCWQ1wQ==": { "id": "m0hcMUeRLwmMKjncCWQ1wQ==", "name": "util-linux", "version": "2.37.4-21.el9_7", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "m7hOFCjo7x6PMvux7htFOg==": { "id": "m7hOFCjo7x6PMvux7htFOg==", "name": "cracklib-dicts", "version": "2.9.6-27.el9", "kind": "binary", "source": { "id": "", "name": "cracklib", "version": "2.9.6-27.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "mK/FUfODp3MR7WS2xegPsw==": { "id": "mK/FUfODp3MR7WS2xegPsw==", "name": "langpacks-core-en", "version": "3.0-16.el9", "kind": "binary", "source": { "id": "", "name": "langpacks", "version": "3.0-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "mPqGnMbiXN6jP61aGbHvOA==": { "id": "mPqGnMbiXN6jP61aGbHvOA==", "name": "libyaml", "version": "0.2.5-7.el9", "kind": "binary", "source": { "id": "", "name": "libyaml", "version": "0.2.5-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "mWpxQAUiV6nN451/LkTR5w==": { "id": "mWpxQAUiV6nN451/LkTR5w==", "name": "git-core", "version": "2.47.3-1.el9_6", "kind": "binary", "source": { "id": "", "name": "git", "version": "2.47.3-1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "meyF9qLalTOagADXp9lO7Q==": { "id": "meyF9qLalTOagADXp9lO7Q==", "name": "libkadm5", "version": "1.21.1-8.el9_6", "kind": "binary", "source": { "id": "", "name": "krb5", "version": "1.21.1-8.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "n/QavSZA9Po4xvQu/EMavg==": { "id": "n/QavSZA9Po4xvQu/EMavg==", "name": "nodejs-full-i18n", "version": "1:22.19.0-2.module+el9.7.0+23475+0a960596", "kind": "binary", "source": { "id": "", "name": "nodejs", "version": "22.19.0-2.module+el9.7.0+23475+0a960596", "kind": "source", "normalized_version": "", "module": "nodejs:22", "cpe": "" }, "normalized_version": "", "module": "nodejs:22", "arch": "x86_64", "cpe": "" }, "n7aNrQrPqOi9MYUVRT/saQ==": { "id": "n7aNrQrPqOi9MYUVRT/saQ==", "name": "glib2-devel", "version": "2.68.4-18.el9_7.1", "kind": "binary", "source": { "id": "", "name": "glib2", "version": "2.68.4-18.el9_7.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "n7mOL22NuOUufoEmlGqORw==": { "id": "n7mOL22NuOUufoEmlGqORw==", "name": "libquadmath-devel", "version": "11.5.0-11.el9", "kind": "binary", "source": { "id": "", "name": "gcc", "version": "11.5.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "na4ojyfFHL07xf5Yr8wxsg==": { "id": "na4ojyfFHL07xf5Yr8wxsg==", "name": "libgpg-error-devel", "version": "1.42-5.el9", "kind": "binary", "source": { "id": "", "name": "libgpg-error", "version": "1.42-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "niuM5rOifNUdHg6kcArzvw==": { "id": "niuM5rOifNUdHg6kcArzvw==", "name": "libmount-devel", "version": "2.37.4-21.el9_7", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "nqniqNEVhrfub8cS+os87A==": { "id": "nqniqNEVhrfub8cS+os87A==", "name": "fonts-srpm-macros", "version": "1:2.0.5-7.el9.1", "kind": "binary", "source": { "id": "", "name": "fonts-rpm-macros", "version": "2.0.5-7.el9.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "nuIyutUqK6hTmg/S9ojklw==": { "id": "nuIyutUqK6hTmg/S9ojklw==", "name": "yum", "version": "4.14.0-31.el9", "kind": "binary", "source": { "id": "", "name": "dnf", "version": "4.14.0-31.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "oIqBLVUdTw3vIPAyQdS/tA==": { "id": "oIqBLVUdTw3vIPAyQdS/tA==", "name": "python3-subscription-manager-rhsm", "version": "1.29.47.1-1.el9_7", "kind": "binary", "source": { "id": "", "name": "subscription-manager", "version": "1.29.47.1-1.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "oK41W21MyjS/j+5BoCQjuA==": { "id": "oK41W21MyjS/j+5BoCQjuA==", "name": "tcl", "version": "1:8.6.10-7.el9", "kind": "binary", "source": { "id": "", "name": "tcl", "version": "8.6.10-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "obNuQXzAwE3TzjUoRN1yEw==": { "id": "obNuQXzAwE3TzjUoRN1yEw==", "name": "libbabeltrace", "version": "1.5.8-10.el9", "kind": "binary", "source": { "id": "", "name": "babeltrace", "version": "1.5.8-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "osuCNzTJ+Fjh0P4Yfe9E1g==": { "id": "osuCNzTJ+Fjh0P4Yfe9E1g==", "name": "python3-setuptools", "version": "53.0.0-15.el9", "kind": "binary", "source": { "id": "", "name": "python-setuptools", "version": "53.0.0-15.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "p7SpaXJk05lb33Ey0lqxHw==": { "id": "p7SpaXJk05lb33Ey0lqxHw==", "name": "libcom_err-devel", "version": "1.46.5-8.el9", "kind": "binary", "source": { "id": "", "name": "e2fsprogs", "version": "1.46.5-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "p9E62zY/VzvgMSvTX9UkJg==": { "id": "p9E62zY/VzvgMSvTX9UkJg==", "name": "crypto-policies-scripts", "version": "20250905-1.git377cc42.el9_7", "kind": "binary", "source": { "id": "", "name": "crypto-policies", "version": "20250905-1.git377cc42.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "pvBQbvRSWZsI3DUucyjs+A==": { "id": "pvBQbvRSWZsI3DUucyjs+A==", "name": "libpq-devel", "version": "13.23-1.el9_7", "kind": "binary", "source": { "id": "", "name": "libpq", "version": "13.23-1.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "q4zKXqPU+5vLvZLEG6zEXw==": { "id": "q4zKXqPU+5vLvZLEG6zEXw==", "name": "perl-Getopt-Std", "version": "1.12-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "q8h8ag3Ho33Zc/60lMOvVA==": { "id": "q8h8ag3Ho33Zc/60lMOvVA==", "name": "unzip", "version": "6.0-59.el9", "kind": "binary", "source": { "id": "", "name": "unzip", "version": "6.0-59.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "qGKV3oqLguMWpyzvjv1+wg==": { "id": "qGKV3oqLguMWpyzvjv1+wg==", "name": "libtiff-devel", "version": "4.4.0-15.el9_7.2", "kind": "binary", "source": { "id": "", "name": "libtiff", "version": "4.4.0-15.el9_7.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "qKN/Sy8G7n1xl+F5J1m1bg==": { "id": "qKN/Sy8G7n1xl+F5J1m1bg==", "name": "perl-File-Copy", "version": "2.34-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "qYSZ6aKFWol313IOGRXaug==": { "id": "qYSZ6aKFWol313IOGRXaug==", "name": "json-c", "version": "0.14-11.el9", "kind": "binary", "source": { "id": "", "name": "json-c", "version": "0.14-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "qc0Yt1AzZC+CY6qdjO+fZA==": { "id": "qc0Yt1AzZC+CY6qdjO+fZA==", "name": "python3-idna", "version": "2.10-7.el9_4.1", "kind": "binary", "source": { "id": "", "name": "python-idna", "version": "2.10-7.el9_4.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "qco/AqMt9denZ9GeHFnEaA==": { "id": "qco/AqMt9denZ9GeHFnEaA==", "name": "libbpf", "version": "2:1.5.0-2.el9", "kind": "binary", "source": { "id": "", "name": "libbpf", "version": "1.5.0-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "qklPItzKPipAd2a3RHZZIA==": { "id": "qklPItzKPipAd2a3RHZZIA==", "name": "libfido2", "version": "1.13.0-2.el9", "kind": "binary", "source": { "id": "", "name": "libfido2", "version": "1.13.0-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "qsJmM3aYeYGdvjHxtaNdaQ==": { "id": "qsJmM3aYeYGdvjHxtaNdaQ==", "name": "perl-Errno", "version": "1.30-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "r0GDCuRXOUGVJzCqB4JFMw==": { "id": "r0GDCuRXOUGVJzCqB4JFMw==", "name": "bzip2-devel", "version": "1.0.8-10.el9_5", "kind": "binary", "source": { "id": "", "name": "bzip2", "version": "1.0.8-10.el9_5", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "rCLp3m64Catai9VuHvh3Lw==": { "id": "rCLp3m64Catai9VuHvh3Lw==", "name": "keyutils-libs", "version": "1.6.3-1.el9", "kind": "binary", "source": { "id": "", "name": "keyutils", "version": "1.6.3-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "rEU0uZUpz06y9hg0ORc49A==": { "id": "rEU0uZUpz06y9hg0ORc49A==", "name": "libpwquality", "version": "1.4.4-8.el9", "kind": "binary", "source": { "id": "", "name": "libpwquality", "version": "1.4.4-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "rUUieTQ6JPdOKUOFRfhvNw==": { "id": "rUUieTQ6JPdOKUOFRfhvNw==", "name": "perl-MIME-Base64", "version": "3.16-4.el9", "kind": "binary", "source": { "id": "", "name": "perl-MIME-Base64", "version": "3.16-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "rY/kE/V4JnxYoqV+lmc9mg==": { "id": "rY/kE/V4JnxYoqV+lmc9mg==", "name": "gawk", "version": "5.1.0-6.el9", "kind": "binary", "source": { "id": "", "name": "gawk", "version": "5.1.0-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "rZckolqfVnE7xInGZn5Zzw==": { "id": "rZckolqfVnE7xInGZn5Zzw==", "name": "python3-pysocks", "version": "1.7.1-12.el9", "kind": "binary", "source": { "id": "", "name": "python-pysocks", "version": "1.7.1-12.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "rd4/gPEUtK2p++ni1m1dDg==": { "id": "rd4/gPEUtK2p++ni1m1dDg==", "name": "libsepol", "version": "3.6-3.el9", "kind": "binary", "source": { "id": "", "name": "libsepol", "version": "3.6-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "rflqn7XKJvnH8dP67kgM7A==": { "id": "rflqn7XKJvnH8dP67kgM7A==", "name": "qt5-srpm-macros", "version": "5.15.9-1.el9", "kind": "binary", "source": { "id": "", "name": "qt5", "version": "5.15.9-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "rj2k4My0f4W7sR9R0rDeJg==": { "id": "rj2k4My0f4W7sR9R0rDeJg==", "name": "perl-Pod-Usage", "version": "4:2.01-4.el9", "kind": "binary", "source": { "id": "", "name": "perl-Pod-Usage", "version": "2.01-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "rlHYqOr0lkUB/Gs6b1kD2g==": { "id": "rlHYqOr0lkUB/Gs6b1kD2g==", "name": "mpfr", "version": "4.1.0-7.el9", "kind": "binary", "source": { "id": "", "name": "mpfr", "version": "4.1.0-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "s/zVhVCY3vRmmv6PJdGLCg==": { "id": "s/zVhVCY3vRmmv6PJdGLCg==", "name": "perl-IO-Socket-SSL", "version": "2.073-2.el9", "kind": "binary", "source": { "id": "", "name": "perl-IO-Socket-SSL", "version": "2.073-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "sE1EmQ5Nhv4P4rilE6lODw==": { "id": "sE1EmQ5Nhv4P4rilE6lODw==", "name": "lsof", "version": "4.94.0-3.el9", "kind": "binary", "source": { "id": "", "name": "lsof", "version": "4.94.0-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "sKD1m/Tx9mlFSspWqkqwXA==": { "id": "sKD1m/Tx9mlFSspWqkqwXA==", "name": "flask", "version": "2.3.3", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.2.3.3.0.0.0.0.0.0", "cpe": "" }, "sOl5EHhMcC/OeH5rJHkypQ==": { "id": "sOl5EHhMcC/OeH5rJHkypQ==", "name": "openssh", "version": "8.7p1-47.el9_7", "kind": "binary", "source": { "id": "", "name": "openssh", "version": "8.7p1-47.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "sXA/H9XX1FCBnut09ugTOw==": { "id": "sXA/H9XX1FCBnut09ugTOw==", "name": "nss_wrapper-libs", "version": "1.1.13-1.el9", "kind": "binary", "source": { "id": "", "name": "nss_wrapper", "version": "1.1.13-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "sZC9JChvb46EmDWlVsLY4Q==": { "id": "sZC9JChvb46EmDWlVsLY4Q==", "name": "hostname", "version": "3.23-6.el9", "kind": "binary", "source": { "id": "", "name": "hostname", "version": "3.23-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ssPaV1VLDu6d5ZJ6Rrmh3A==": { "id": "ssPaV1VLDu6d5ZJ6Rrmh3A==", "name": "sed", "version": "4.8-9.el9", "kind": "binary", "source": { "id": "", "name": "sed", "version": "4.8-9.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "su3U01UxGSz5b2TyKbsC/w==": { "id": "su3U01UxGSz5b2TyKbsC/w==", "name": "python3-pip", "version": "21.3.1-1.el9", "kind": "binary", "source": { "id": "", "name": "python-pip", "version": "21.3.1-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "sukNATkcLkohYgGrhDtrZA==": { "id": "sukNATkcLkohYgGrhDtrZA==", "name": "libxcrypt-devel", "version": "4.4.18-3.el9", "kind": "binary", "source": { "id": "", "name": "libxcrypt", "version": "4.4.18-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "svMaWd1Pkq6Z/UDBHTpApg==": { "id": "svMaWd1Pkq6Z/UDBHTpApg==", "name": "keyutils-libs-devel", "version": "1.6.3-1.el9", "kind": "binary", "source": { "id": "", "name": "keyutils", "version": "1.6.3-1.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "sx0C6L5COHIkv6yQQyPlbw==": { "id": "sx0C6L5COHIkv6yQQyPlbw==", "name": "libunistring", "version": "0.9.10-15.el9", "kind": "binary", "source": { "id": "", "name": "libunistring", "version": "0.9.10-15.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "t28Zc7/vifVyS7O17xTUSA==": { "id": "t28Zc7/vifVyS7O17xTUSA==", "name": "pcre-devel", "version": "8.44-4.el9", "kind": "binary", "source": { "id": "", "name": "pcre", "version": "8.44-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "tGPn3pK3U8y547XMf1WmhQ==": { "id": "tGPn3pK3U8y547XMf1WmhQ==", "name": "glibc-gconv-extra", "version": "2.34-231.el9_7.2", "kind": "binary", "source": { "id": "", "name": "glibc", "version": "2.34-231.el9_7.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "tWWw65aFr0Her+B1hlgbqA==": { "id": "tWWw65aFr0Her+B1hlgbqA==", "name": "perl-Pod-Simple", "version": "1:3.42-4.el9", "kind": "binary", "source": { "id": "", "name": "perl-Pod-Simple", "version": "3.42-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "tYvC71hd5ARf4WITmeyfxA==": { "id": "tYvC71hd5ARf4WITmeyfxA==", "name": "pcre2-utf16", "version": "10.40-6.el9", "kind": "binary", "source": { "id": "", "name": "pcre2", "version": "10.40-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ttbQC41rI30fYBaVUH1hLQ==": { "id": "ttbQC41rI30fYBaVUH1hLQ==", "name": "libpng-devel", "version": "2:1.6.37-12.el9_7.1", "kind": "binary", "source": { "id": "", "name": "libpng", "version": "1.6.37-12.el9_7.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "txEovS086NkVY5rNikpoEA==": { "id": "txEovS086NkVY5rNikpoEA==", "name": "python3-hawkey", "version": "0.69.0-16.el9", "kind": "binary", "source": { "id": "", "name": "libdnf", "version": "0.69.0-16.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "u5TyEoU5GA6Z2czzwhMLiA==": { "id": "u5TyEoU5GA6Z2czzwhMLiA==", "name": "fonts-filesystem", "version": "1:2.0.5-7.el9.1", "kind": "binary", "source": { "id": "", "name": "fonts-rpm-macros", "version": "2.0.5-7.el9.1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "v6X9Dt1wPw8fK6VaHz1Ffw==": { "id": "v6X9Dt1wPw8fK6VaHz1Ffw==", "name": "perl-threads-shared", "version": "1.61-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-threads-shared", "version": "1.61-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "v9Q18SPC524XLCjLQkFyLg==": { "id": "v9Q18SPC524XLCjLQkFyLg==", "name": "perl-AutoLoader", "version": "5.74-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "vXRu1n6ncYWvB8yrZupytw==": { "id": "vXRu1n6ncYWvB8yrZupytw==", "name": "cyrus-sasl-devel", "version": "2.1.27-22.el9", "kind": "binary", "source": { "id": "", "name": "cyrus-sasl", "version": "2.1.27-22.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "vw1F3IS9ZqFqIEU3E24hLQ==": { "id": "vw1F3IS9ZqFqIEU3E24hLQ==", "name": "libwebp-devel", "version": "1.2.0-8.el9_3", "kind": "binary", "source": { "id": "", "name": "libwebp", "version": "1.2.0-8.el9_3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "w2DoavvB02S/+BS01jQqJw==": { "id": "w2DoavvB02S/+BS01jQqJw==", "name": "openblas-srpm-macros", "version": "2-11.el9", "kind": "binary", "source": { "id": "", "name": "openblas-srpm-macros", "version": "2-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "w9ndxjIpPQXv3PDulnya7A==": { "id": "w9ndxjIpPQXv3PDulnya7A==", "name": "libX11", "version": "1.7.0-11.el9", "kind": "binary", "source": { "id": "", "name": "libX11", "version": "1.7.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "wCA3gMNtInqX1xg18QcnQg==": { "id": "wCA3gMNtInqX1xg18QcnQg==", "name": "ca-certificates", "version": "2024.2.69_v8.0.303-91.4.el9_4", "kind": "binary", "source": { "id": "", "name": "ca-certificates", "version": "2024.2.69_v8.0.303-91.4.el9_4", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "wKkzDAoEH1CCGQWghKjKdA==": { "id": "wKkzDAoEH1CCGQWghKjKdA==", "name": "libuuid", "version": "2.37.4-21.el9_7", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "wVOHUaFC3qlk+Ft1W2VH7A==": { "id": "wVOHUaFC3qlk+Ft1W2VH7A==", "name": "python3-gobject-base-noarch", "version": "3.40.1-6.el9", "kind": "binary", "source": { "id": "", "name": "pygobject3", "version": "3.40.1-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "wYIIhtw19AhoRPO0XAvoxw==": { "id": "wYIIhtw19AhoRPO0XAvoxw==", "name": "bsdtar", "version": "3.5.3-6.el9_6", "kind": "binary", "source": { "id": "", "name": "libarchive", "version": "3.5.3-6.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "wdMozBSF06uhI4HOI003SQ==": { "id": "wdMozBSF06uhI4HOI003SQ==", "name": "perl-Term-Cap", "version": "1.17-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-Term-Cap", "version": "1.17-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "wfJGCqOH8d+IYg/dAepx1A==": { "id": "wfJGCqOH8d+IYg/dAepx1A==", "name": "libarchive", "version": "3.5.3-6.el9_6", "kind": "binary", "source": { "id": "", "name": "libarchive", "version": "3.5.3-6.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "wvtx3JsOUmPyorardjeYSQ==": { "id": "wvtx3JsOUmPyorardjeYSQ==", "name": "fontconfig-devel", "version": "2.14.0-2.el9_1", "kind": "binary", "source": { "id": "", "name": "fontconfig", "version": "2.14.0-2.el9_1", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "ww1NPX/mwmdtd47p1Hp8FQ==": { "id": "ww1NPX/mwmdtd47p1Hp8FQ==", "name": "libX11-devel", "version": "1.7.0-11.el9", "kind": "binary", "source": { "id": "", "name": "libX11", "version": "1.7.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "x4oijVhQU8BUwJwoFvk4QA==": { "id": "x4oijVhQU8BUwJwoFvk4QA==", "name": "libmodulemd", "version": "2.13.0-2.el9", "kind": "binary", "source": { "id": "", "name": "libmodulemd", "version": "2.13.0-2.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "xGsFnJNA7f9q/+8cz1QFqg==": { "id": "xGsFnJNA7f9q/+8cz1QFqg==", "name": "lua-srpm-macros", "version": "1-6.el9", "kind": "binary", "source": { "id": "", "name": "lua-rpm-macros", "version": "1-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "xItFXMbfthPTJh/VhaoYeA==": { "id": "xItFXMbfthPTJh/VhaoYeA==", "name": "perl-Fcntl", "version": "1.13-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "xTea8RVD9wez5DTFDIkCYg==": { "id": "xTea8RVD9wez5DTFDIkCYg==", "name": "libtiff", "version": "4.4.0-15.el9_7.2", "kind": "binary", "source": { "id": "", "name": "libtiff", "version": "4.4.0-15.el9_7.2", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "xVpXFb43dZh4HfBX53yyew==": { "id": "xVpXFb43dZh4HfBX53yyew==", "name": "python3-iniparse", "version": "0.4-45.el9", "kind": "binary", "source": { "id": "", "name": "python-iniparse", "version": "0.4-45.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "xfiNHrth0bRlTgQnR3IgUw==": { "id": "xfiNHrth0bRlTgQnR3IgUw==", "name": "libpsl", "version": "0.21.1-5.el9", "kind": "binary", "source": { "id": "", "name": "libpsl", "version": "0.21.1-5.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "xgCGPQ7CZbjJqBTw2Nmu9w==": { "id": "xgCGPQ7CZbjJqBTw2Nmu9w==", "name": "groff-base", "version": "1.22.4-10.el9", "kind": "binary", "source": { "id": "", "name": "groff", "version": "1.22.4-10.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "xnmn6fk+/THLJg3emXYMww==": { "id": "xnmn6fk+/THLJg3emXYMww==", "name": "perl-libnet", "version": "3.13-4.el9", "kind": "binary", "source": { "id": "", "name": "perl-libnet", "version": "3.13-4.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "xvET6Njr4M7QE6Z5iUtA9g==": { "id": "xvET6Njr4M7QE6Z5iUtA9g==", "name": "httpd-devel", "version": "2.4.62-7.el9_7.3", "kind": "binary", "source": { "id": "", "name": "httpd", "version": "2.4.62-7.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "y8SuAyUvVIkzKZ1B4+P8EQ==": { "id": "y8SuAyUvVIkzKZ1B4+P8EQ==", "name": "mod_ldap", "version": "2.4.62-7.el9_7.3", "kind": "binary", "source": { "id": "", "name": "httpd", "version": "2.4.62-7.el9_7.3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "y9sflCLWTaHWSSC+w8u7bQ==": { "id": "y9sflCLWTaHWSSC+w8u7bQ==", "name": "xz-devel", "version": "5.2.5-8.el9_0", "kind": "binary", "source": { "id": "", "name": "xz", "version": "5.2.5-8.el9_0", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "yEp9fQVFIQAEDPCwC3GLmA==": { "id": "yEp9fQVFIQAEDPCwC3GLmA==", "name": "libsemanage", "version": "3.6-5.el9_6", "kind": "binary", "source": { "id": "", "name": "libsemanage", "version": "3.6-5.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "yHwqZ1KSVBKOdg3PvZkURg==": { "id": "yHwqZ1KSVBKOdg3PvZkURg==", "name": "perl-NDBM_File", "version": "1.15-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "yMfhY0UxLchgIpNP2r2lyQ==": { "id": "yMfhY0UxLchgIpNP2r2lyQ==", "name": "make", "version": "1:4.3-8.el9", "kind": "binary", "source": { "id": "", "name": "make", "version": "4.3-8.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "yU2oeSGRdhrEc6MC885lzw==": { "id": "yU2oeSGRdhrEc6MC885lzw==", "name": "mod_auth_gssapi", "version": "1.6.3-7.el9", "kind": "binary", "source": { "id": "", "name": "mod_auth_gssapi", "version": "1.6.3-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "yY469KfvqdHWbJwmOcIU1Q==": { "id": "yY469KfvqdHWbJwmOcIU1Q==", "name": "perl-Carp", "version": "1.50-460.el9", "kind": "binary", "source": { "id": "", "name": "perl-Carp", "version": "1.50-460.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "ycSS8xsUDu5nMwsql04xfQ==": { "id": "ycSS8xsUDu5nMwsql04xfQ==", "name": "gd", "version": "2.3.2-3.el9", "kind": "binary", "source": { "id": "", "name": "gd", "version": "2.3.2-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "yjR8lvdxVJDPIeBNVwLrcA==": { "id": "yjR8lvdxVJDPIeBNVwLrcA==", "name": "blinker", "version": "1.9.0", "kind": "binary", "source": { "id": "", "name": "", "version": "", "normalized_version": "", "cpe": "" }, "normalized_version": "pep440:0.1.9.0.0.0.0.0.0.0", "cpe": "" }, "yr/wq9xPQXa1ScGcnndSag==": { "id": "yr/wq9xPQXa1ScGcnndSag==", "name": "libblkid", "version": "2.37.4-21.el9_7", "kind": "binary", "source": { "id": "", "name": "util-linux", "version": "2.37.4-21.el9_7", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "z+4p7UhT99HApht5JWOY7w==": { "id": "z+4p7UhT99HApht5JWOY7w==", "name": "libselinux-devel", "version": "3.6-3.el9", "kind": "binary", "source": { "id": "", "name": "libselinux", "version": "3.6-3.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "zDt2Vfv35KL/GbH9JG8H3A==": { "id": "zDt2Vfv35KL/GbH9JG8H3A==", "name": "libX11-common", "version": "1.7.0-11.el9", "kind": "binary", "source": { "id": "", "name": "libX11", "version": "1.7.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "zIFn1hwQ+gf5tSEzT54ZNg==": { "id": "zIFn1hwQ+gf5tSEzT54ZNg==", "name": "hunspell-filesystem", "version": "1.7.0-11.el9", "kind": "binary", "source": { "id": "", "name": "hunspell", "version": "1.7.0-11.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "zLbmCpiDy68qsFvtKNzmgQ==": { "id": "zLbmCpiDy68qsFvtKNzmgQ==", "name": "xml-common", "version": "0.6.3-58.el9", "kind": "binary", "source": { "id": "", "name": "sgml-common", "version": "0.6.3-58.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "zSH6RyP9GPyMR7PgpQVpgQ==": { "id": "zSH6RyP9GPyMR7PgpQVpgQ==", "name": "apr-util-devel", "version": "1.6.1-23.el9", "kind": "binary", "source": { "id": "", "name": "apr-util", "version": "1.6.1-23.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "zYkGoXzaE5np8s88FoALNQ==": { "id": "zYkGoXzaE5np8s88FoALNQ==", "name": "usermode", "version": "1.114-7.el9", "kind": "binary", "source": { "id": "", "name": "usermode", "version": "1.114-7.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "zbfsUtSlKsegyV6mTxR13A==": { "id": "zbfsUtSlKsegyV6mTxR13A==", "name": "dnf", "version": "4.14.0-31.el9", "kind": "binary", "source": { "id": "", "name": "dnf", "version": "4.14.0-31.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" }, "zfyfWkP+jPZaONI2HeiXQw==": { "id": "zfyfWkP+jPZaONI2HeiXQw==", "name": "perl-B", "version": "1.80-481.1.el9_6", "kind": "binary", "source": { "id": "", "name": "perl", "version": "5.32.1-481.1.el9_6", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "zmiWZ9YjduqgYQPI8rU4ug==": { "id": "zmiWZ9YjduqgYQPI8rU4ug==", "name": "libwebp", "version": "1.2.0-8.el9_3", "kind": "binary", "source": { "id": "", "name": "libwebp", "version": "1.2.0-8.el9_3", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "x86_64", "cpe": "" }, "zxuLMmxubC84XoLpkfxZ3w==": { "id": "zxuLMmxubC84XoLpkfxZ3w==", "name": "perl-Mozilla-CA", "version": "20200520-6.el9", "kind": "binary", "source": { "id": "", "name": "perl-Mozilla-CA", "version": "20200520-6.el9", "kind": "source", "normalized_version": "", "cpe": "" }, "normalized_version": "", "arch": "noarch", "cpe": "" } }, "distributions": { "38a7bc9f-3a35-41ef-8b88-c11074c9752a": { "id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "did": "rhel", "name": "Red Hat Enterprise Linux Server", "version": "9", "version_code_name": "", "version_id": "9", "arch": "", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "pretty_name": "Red Hat Enterprise Linux Server 9" } }, "repository": { "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2": { "id": "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "name": "cpe:/a:redhat:enterprise_linux:9::appstream", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*" }, "1f9dea12-6401-4343-bee0-854858fa2a92": { "id": "1f9dea12-6401-4343-bee0-854858fa2a92", "name": "cpe:/a:redhat:enterprise_linux:9::appstream", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*" }, "41207915-8511-4e9f-b33b-fc46cd9def16": { "id": "41207915-8511-4e9f-b33b-fc46cd9def16", "name": "cpe:/a:redhat:enterprise_linux:9::appstream", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*" }, "43c8ba95-8e89-4c2d-b5dd-585efd9c5755": { "id": "43c8ba95-8e89-4c2d-b5dd-585efd9c5755", "name": "pypi", "uri": "https://pypi.org/simple", "cpe": "" }, "7d22bd93-3685-40a0-bc8a-570859cc1547": { "id": "7d22bd93-3685-40a0-bc8a-570859cc1547", "name": "cpe:/o:redhat:enterprise_linux:9::baseos", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*" }, "7e844200-81a8-4614-98bf-00707f419661": { "id": "7e844200-81a8-4614-98bf-00707f419661", "name": "cpe:/o:redhat:enterprise_linux:9::baseos", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*" }, "885593ba-05cd-48de-82b5-b4b66155f04d": { "id": "885593ba-05cd-48de-82b5-b4b66155f04d", "name": "cpe:/o:redhat:enterprise_linux:9::baseos", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*" }, "bc59b935-5540-4ec5-9e69-ca28aee5bdfa": { "id": "bc59b935-5540-4ec5-9e69-ca28aee5bdfa", "name": "cpe:/o:redhat:enterprise_linux:9::baseos", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:baseos:*:*:*:*:*" }, "c29e5af2-3470-4007-bea6-57aaeafd63ce": { "id": "c29e5af2-3470-4007-bea6-57aaeafd63ce", "name": "cpe:/a:redhat:enterprise_linux:9::appstream", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:a:redhat:enterprise_linux:9:*:appstream:*:*:*:*:*" } }, "environments": { "+A7/nzEXX3Q/xJZ50VMnlQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "+B22ALb6YCnXu+3s6afaLg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "+ELGclZlzVhkDoWJwZc9OA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "+HmNQdmjJTL5gC4nHHd6rw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "+X1MdmtPTbyDb/wq7joJhA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "+bwl6UbMaWOBWdHNekJsEw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "+v/DtyduRnxay/g57zCBpw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "+y+as2YNBEvOddTPxl73DA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "/Bb6eVO+je9kbuIGTvt6Ww==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "/L1kFEoHZTukrNTCQLypFQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "/O7rOBo1qRMFm3q3Kf3mEw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "/THiuz93dsCZJETS3A4Xtw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "/XUXPfxfCal3j0ldx+af3A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "/h/TBQhfoSMCmey5oN87jA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "/l8wc0qlQdZdqgMIy+AX4w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "/oIjTiZph8FPjlWNL5s82w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "/oLe91LMLglvpqo76adFGw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "/r9XRETcIT4sCg595ze+cA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "0133y/ZC+9hrvuSzgka7cw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "04b0yaCHYk5DVzS89hVjvw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "09fH92fqoWDOaYEpwQ9p2g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "09iCgGFB6KlEK9g5KeyifA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "09r8DbZFJmI1tQW/a+ZlWQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "0NHnPl3pNsT2FH8oGcfyEw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "0fqyUk3Q4wjepXsEzVTbuQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "0gNpYdx7/dHkr8z85zHOSg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "0kf4C6OH9tp4+UaKjumyEg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "0lplo4qGxIA48pUhdbCYJg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "1+Lg0PO3SMtKcC7avbi64w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "1XXuvf69/0I2dNHaU2UndQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "1atoBfoH0mJ0bCpetQ7/0g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "1c1WdORtp7MIh8iUYW8joA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "1h2bWnAaSbAMrDYM8V/8sw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "1jyJPCL93kiEbfmNKeyz3g==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:7102a2cde127306f405785c2bcbe536e4aeaaa13e256f30dd671a6083b805b89", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "1m9sKqHTfU4F/K4fidg9cg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "1p1wTPVFlokLdC9/X3ksGg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "1pWwHIWE2UYOVNkFfcPZhQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "1pqtMQqVpCMzDCv8KXVyuA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "295Mf6xxPMSuYkMc24cf0A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "2QUKRSh7NN4cTp6+OOEm8w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "2gCbp4kt+cF44NF/LqukDg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "2hVeGisxeIl5ZCVdBXxWKg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "2w8qE/d9mqIY/9+1qBBrPg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "2zIvfSXFI57wQ4jcmb8tGg==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "35MvZs/A5NUjD+xZ1Vlnyw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "38FdUixzs3eDg/NPZRiJIA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "3JODNwsCAiV/sk6j3hiOxw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "3XsqGfTFjY5lWf0VTh588Q==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:7102a2cde127306f405785c2bcbe536e4aeaaa13e256f30dd671a6083b805b89", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "3YAw8el/3rSN8/26QNTqsA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "3adzKM06LvCWYFXCgwdnjA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "3kiQXJjCV5HlO0qf9OFzoQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "3xX+GtMW5t5rNj/zejJWEQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "40gZpuDvr8Y82hwRT4gOdw==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "4DALE9qlRQsocTmGTN3jhg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "4Kw/w2gH7CYCOCv19cdYYA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "4ThUof0MfmoEHGOuzmENug==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:7102a2cde127306f405785c2bcbe536e4aeaaa13e256f30dd671a6083b805b89", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "4U8NwfIL6oZ9HtlVrK/5EQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "4xm12R/wZXmG2Cs/ve2Zjw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "5+tHFkkNi+1rUDSrmgYdkw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "57fPIXyc5AjSlhOEn9ApPA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "582nBqlxZXz0sTRmkFvU4Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "5GtYmv+rWUY9Nq0zLzVwuQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "5JAFUJWmy04+T6x2oJw2jg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "5ZNEjbI9oKcr993lWqrXFA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "5hkeK2sS5i1OF8czY7eD+A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "5j7LQGobcmm2zwYTgrA27g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "5x6eb7pZ/EuGII0pLw9fTg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "60b1mOIk+ncF/benyKWfug==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "60pEkQUMtqjJkDtrBnZkZw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "65vQ2fJTp0DlFVHdZmyGLw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "6AYt+NWt55432RGa/HxiQg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "6G1ytjIPgX0NNsVwuPQKkQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "6HUC1/dPziZpbtWEymw0nQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "6MFxZDjn6ZxVQspQib4VSA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "6SavbYlBTSu7ROvcE770Zw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "6yTvnPP57NJPXUaaMuHa5Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "7/k2KO9ZYtIX1WvnibuCwg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "71E7ojyMFQ1Uwy0VMr2WLg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "79w3HVLsEs5/x4dQ41zIww==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "7NGPdoQ8CufgoRI2a0XI0g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "7cpIREEQnkaI7dbmWgmrvg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "7mDaaxs3ev+uNEDYC97U3Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "7qfWfLUwHD4fkKHlCNW7rg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "7yB5oIQve4tWIMlUmHbdQQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "8+AT+dHyoFXmtWYeClg3hQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "8/+OIixLXu+fX/6UoQwl/g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "84bRLUIEkPTIUqXqCtZLvw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "87EcTL94JiygUQLwYuL2AQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "88jYB91M4ddvxo2XjMJKmQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "8Al1Y3mQILwPqoFjfjIK0Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "8WvHUwfWJkE1eIMXK0EUTA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "8dKij0lKhp8eGM5ynaMPfg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "8gpmX0NZa9MMhcqi6FUGtg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "8k+Ulo3wv2SSKo3DSJNJ6A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "8n6bVUPPsV3vtnz+vLHqKQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "8uME+PFu6p/OAD7q+ZTVLw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "8uNlRHm24HlCfj4vRuzAgA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "96s6QUkd81n7TEwh/GoZsQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "9HjCH3SeUwgItfYZysNlOw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "9bMXqD09C2r4s8P+HNy2uw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "9olIUlLHZMdoUMju+8diyQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "A5zg77FwqyQ7YbgSi5bkFw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "ACNA1cjsRpihwLsZYxMiYQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "AMvlCR3g+vHIXnbjgXeX2Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "AUjudWCWcMUZtLYqynIMkg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "AbW1lRpGUjSEKNnr/Toz6A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "AsexXT9SbeDFWXwi6d7SxQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "At9otkYcx2c7gDG/+qxMog==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "BBozCOtHwec3Xfe7j7ZMUw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "BIzbOPagaosMprtM0oW/UQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "BQhiFmX4hLYteW4oRCLTSA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "BRLVvSCW1qZQlEQR2x48fQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "Be3u3fxCSx0yV9rW5tn7+A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "CM/XLOAV8nEwvYEgfvOluA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "CQ7LW8sdHcbka0B3IpMM1Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "CS6z0/SKwjMOr6VBFQ1+lw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "CfMo51dlSGLRWNluoKfMUQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "Cn4UOizx3r/8sEEZ0cgGfw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "CpfomSYboaXPZ9yn9NgGgw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "Cwut2mrMMUaIvKenvO1qWw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "D0cOLNJoJ2zu9AQItFxRQA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "D3RCrUIdQ+uwLTm+GGcqSA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "D5m7YK6SRxMXWJzbEMw9qw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "DK0d2bPQCX0xz6Lec7u1cg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "DNyIkrd4IXePRueLDNc6ZA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "DVT5EsNYhhc4TADNn+PvwA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "DVWG3mWD7odZzCgFCUPZPw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "DY5Co0gkGtbgwDlkjfJLWA==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:7102a2cde127306f405785c2bcbe536e4aeaaa13e256f30dd671a6083b805b89", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "Dr450EIuIZqHVptoUeerYQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "DrLq8qfU1bfE8o8AfdvkrQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "DyVc00dL0fB/TbUtdImPIA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "EEcEMKhGMvXAfnMhboIpqw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "ESNqe3PeaOUuYEzUgxfVAA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "EhaFwS5l8+kj0ips0KX28g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "EjrCko4EN35q3gOrHdIWjw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "EnQzaG96EBHr5ye6u8iVOQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "Ep9qjtRg5KBEw8RkogSOKQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "Esfj4A6yCPG0aR5IhgHmUg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "Exv8+xTp+7Y4AfuM+ph47Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "F90x58kELkC16MbTpMw3vg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "FDdpwYO23GZzR/6AZCdQZA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "FEF27h+V5TzrUeQsFddapA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "FEW4+DY0GhovHIdRCyqYhg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "FFSNe661VBElA1asGZ7k3g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "FKD/ouYSWOOZHy4i43SaxA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "FW8ByCOP6ljvNWDQolahwg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "FaNO6QWs1mWPp40PrBiBUQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "FiLBkAWUUsnpX53xBEBwNw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "FoNZoDzlktTR7m0xbn6aAw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "FoncQi9chif7gDbfNIi6VQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "G1YDEd7+V95Qa+PMxB8sJw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "G61ZL2SOHR2qgvQfi118gw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "GIScmMWQrnoFNoEgq3fg2w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "GJbaWmnnmSb6F31bTeHB5g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "GSkR2SOuqWQN8NtOvU4cgw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "GcPR4oPcmP8xTRqQf8mOrA==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:7102a2cde127306f405785c2bcbe536e4aeaaa13e256f30dd671a6083b805b89", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "GdLrcchvFseDsR7KOv0vSQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "Gfe/qKITedzO94FGUpZ5bQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "GpOp3xfmb0XA+PmFyqyn0g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "GrohJMl/MISMll2qndOSGg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "GtFO3rQtk4lExV/Q1qfFOg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "GwNK8p9XcJLynTdoZWdCxg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "H3zfV58LzeEUiNQbZbZb2A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "HFwGHerHwgvY8vkjr3x1Pg==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:7102a2cde127306f405785c2bcbe536e4aeaaa13e256f30dd671a6083b805b89", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "HKlRsQZtXaa3HoNDv500tg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "HQdWvmyUSqtI3UTY0T4JiQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "HaOoNwb8lV6rMAwKRGxXbA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "HyWYXl8ZaOY6wtr4mKF7qA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "I16VSEydeiRYB1TSf5694A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "I4xeNeKgfXcsAYIlRhjPiQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "IC3qYOgP07zDDhN8OMm04Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "IDaB7M+//88qbPppM+LpUw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "IG/inuDbgBm/XuY2u/Aumw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "IZ65O3ZOapykHwhaOX1/YA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "IqB8E1ANUG9NXQorLZJDiQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "IxIhH0Z+Om/E2wWJgs7oqA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "J4wVTpjsd90BinvJHS7Zqw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "J9w4G6G8Fb/RA473Yv5YuA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "JAKIgWlsG9s5Mu8FvR37Sw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "JF/KXrYQKwPQyQXcXBUzkQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "JKP7JzVg7UGaAz4VrH03lQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "JaeGSHoaw5r486gmcDmRVA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "JqFHrTWNQg3BZ/lmHZPpiQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "JsmK7e5qrU0+Ud/3PQYUAQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "JyUIec2dlrPxCv2b4i6tRQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "KEwhWR+KmcE0gZ+mC6lSDw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "KF5C+zKu/uFB7knCqOvDAQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "KH0/KbRUi7KL6UvWa8i6Pg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "KMPuzPUoJW0H9SIkP0WBiw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "KS0gfrpBqK77mtupKmitjw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "KcPAdOork3AFYl8WLwr8lQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "KcftiMkhTw4x89HNJI8NNg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "KnsryeYjIOfmvupUdl8bDg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "KyRw1LumZrRo6AKKkHgP7w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "L1CJW90/qIOW7PuGFCWT3g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "L2RUW2Fm5EOgoqwyitY3bg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "LDIMlzOywHz1+CG5FwjKdQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "LEyuwSco7tb1WIyWy42H8g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "LPNXQi0V2EN73HoDD+RYaw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "LPYp5WHbuUIrDoVmdSqGPw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "Leh3RdsGa1oyRcl5Dz4SdA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "LjtOegR/S/Y0KwJeOuSl/w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "Lwqn0aweLQLZmo12VvYcog==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "M2qdPAOOvb+CWXJwouP4Rw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "MDH8Zt4oQWDiYk9qFV5Lbg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "MORX6hW9ZLZCt/52w71zTg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "MV68i9xAWcgxaP9HrTHIhA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "MdGkZ055CI+TZYqVm7FIPg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "Mp61fGpK3II0W8dIQgk3hA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "Mta8K+tWCjAV6ERlLy6JNw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "N08IqNY6mPj7A1ISj62yQw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "N0c+hlw+nQPyLzGzZPE+VQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "N2AxbBO2ySQgGMgkdbfo+w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "N9SQ1VZ/1zaqG0gdsMW91g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "NDKmI4fvu2M/TtapvknDEg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "NOQ2NY0Q7pXk1a392bTc5Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "NSiprMdkK5/5pxuNNJOh2A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "Nak/NGhCYVubG4CsEbHhug==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "NdCY2/S+syamLH224R4hug==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "NsU0bgQSA1JrKw3zvB+XBw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "O6NCE8KkqNnnBGJrWxfPwA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "OCIjbR16ktOEiFK36r0WNw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "OgwdUybWl/HQYbnPTE4Psw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "Ohssf0Jzlafd9vtrrUKCXg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "OkY4XBjh2jDTkYhGjNkrUA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "Ol1YWxU11Z64v1nA/zb/5w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "OvOSK0YS4U6j2gyFBATNXg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "P5Om9zCJ/QZ+hnrEvj6fGw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "PCxuTBi9SbzcxEcQiiLesg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "PIk2BBAWexCFofMi5q03RA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "PQJujrJagYV+Ey8n4uQ95g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "PxTtNNt6Us8EraFZluI++g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "Q4EH8dHdml+oN5T9LssIRw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "Q8V6CJq+uIfjVUujX4I61Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "QXZqh0qx9Vk+bcSACeoTQg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "QcXiQZ6UKeueoaxjtrYKog==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "Qk1bxbjfumdXF7/eZ6qhuw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "QlHijPVbW9yTtx/mAeIhAg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "QpWwMw97N/44PyIvwMh0cA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "R9sC7SuM6vJmJZYq/bMHWw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "RH5gHxMLfgSMn5ktJt/VXA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "RIdJTslNAIfH4yKbDsoK9Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "RXh3fimX8fGZeCt4chJEiA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "RYlcnK5aDkYpG2HTfkwNDQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "Rmp+/J0Vf6Z1c/jUFbiVFw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "RmtwCYp+M3KMl7TiyHKwMA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "S06XRLxcmWWQsefRiwpIrg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "S3/WQXqKyyY/T07YqHeeYg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "S7oZGbo6zhW2tPnf4bdYAg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "S8p9UGak1oycptcpYp/1eg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "SDcVZRLpwAQNjUwZ+PuxkA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "SZllfeGD2yJm0VL0H7onLg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "ScSZYXWuosUrTT47e6vL3g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "SsUshR21MZuli8B+sjKoRg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "Su8bfW9ijc0V5CiAum2V1g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "TPIRq84Pr3a6ywzPeCr3Pw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "TSs+KS9B9pkzz7FIgxu+aw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "TkXCvcN2A46dE6BjW9IROw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "To0NR+oyXDu1CYJfmVGurQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "U36pUJLPuq0PwTe+al8muQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "UCztdZ6zzlJMAH60k5rqRA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "UFOUWXspgJlx00D0q0rCUg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "UPcwub579LDL6kq2lq/xZw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "UPrK58zHez+Qpcz+vYl5Wg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "UTNN7VK61RHl/IW+g5aMJA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "UWXJUZfGCJSFYUff3zhl3g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "UcGy2+DIOqObBfK9GBmDEw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "UnaL8VteZLsad5rFJhaXcw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "UsCVnGtHcj2ZvesjLLcG6Q==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:7102a2cde127306f405785c2bcbe536e4aeaaa13e256f30dd671a6083b805b89", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "VPMvwiwbrTXjPkPpxmP3sw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "VV2Z1ngTs6sGvt5SrayPCg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "VX9V+Y680L2xf2tBREdpCw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "VhjrPOGZ9XGEFgLnQWc+KQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "W7uBqJb8l9AhSXjNg1JZQg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "WKZFJYHmPo5x9c8JUEnETA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "WQqPFo8Asn86tAeRqCxr1w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "WVajSGKLGm8z6I23XYAhLQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "WifWl02dLM2pp5urxOSuNg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "WzYxymAFFZiduGsTG/o8gA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "XG5+bW8np2NedSy/od6z8Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "XGaIL7YJmyr8vz8ETC4dAA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "XIcr6HdP94Dud7DtFrfMZg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "XMI2bnJZdxdcHnKc3zgCUA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "XP0LiIWbLisoI52ZCyFcLg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "XTnX2VddNvCYpYt/meLgYA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "XgE+qDogkObCc5XPQHN25A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "XliA1VgMzM5VjjSZdnmlQw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "XwbkaIGCYyq6BjBMVZ1wzw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "Y35yrxWjtTUkUbNtS9+p6g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "Y5PnxdiaM8nGZKt9U6sMKw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "YfEo6WVMrrTwiYOybxFFKg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "YuMHdRatKmZ56mnoWUwdqw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "ZTHevSGB8avmV9Ng4Dpgvg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "ZX4vKkXsoMfQ2HH9oPb0TA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "aJNccc76ay90akro/A82ww==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "aVZ2bh2CbtumQqaoGUZ8hA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "afL/h/3XzYq6me3BTaFWlA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "al0lbET4LJsNSGMw0pP5wg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "arLt5War9yeQ8auYn/Idmw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "b1AC06/TSkB/tmj5EJU3Wg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "bEsPytE/ZdCMbfuAgQc9AA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "bFvWffGqJWr7FWnI7K9NVw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "bJpkI/9naqJZmJnxkKD+fQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "bemGVBhbDe9iV1Kjvd9hAA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "c08XsIFt/fm6inf2p0ZG8A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "cHAJILwEV0OAQcBBnKqncg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "cW4NTPGLvYpE6hhT8bNZrQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "cZtZpGQDMJ8/qYUdQbgb3Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "cgBLWdUd4/YcvkaTWAC3Pg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "cpIirH9DE6nFQZA6wIpxLg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "ct/ndQfSB+G17YP34ufDBA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "d2u6OOcV0gny9xb/XcV90A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "dBKXgz7fNBsMAqmGTkj8sQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "dC9CoYt17eaqinGSVCfCxw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "dH7n2Ct/z7JALFNo9SCMDg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "dchXRtdYUnsIeCwGm4Ct8Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "de44cUqF23LvU0fOSvNRjA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "dj7DwOHHHI+8+9QuzFaSUA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "dpQG/pUwAqVv1OdQqnvylQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "e+CtHsEaBCLbHEFWXwHRyg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "e40n/77uWc/t2R+0m7WchA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "e7W78NrdwYaVEcBcXhDv5Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "e9e6iwwufr2qvMYpuZgq7Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "eEjpOxWkwvzzJN5kkeVUcg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "eRa7MZyiHBvsv7GPhkGKdg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "ejmVM2MTGmDkkntlZCpYEw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "enagVWadN12gI5iPYugyvg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "ev4LjEwclLnf3ehIi3l8oA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "ewbqmzgK8Rzf739yT7IKUQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "f2GhXCi0MGW6C5vh1ih8XQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "f3K2r1U+QmHjsUiML4ziOQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "f86Wc3apFCnJqkXk60X7Cw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "fMAVuEMmdAgbIa7mBMTdbg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "fPqd9vZ8gX6ENS8pJ4Xrwg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "gBWlSWdEA8U1+Ep4A/+M2g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "gJHwCqer7Rl9ijGK6wpg4A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "gngAZQYf0zy4+w3GwgpLmw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "gsKPriszRNKAqMnHK+dXgw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "h7PT3q6O99+SW5+YBpMkiw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "hKJ3xmpaes4B2vxd2C5M1Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "hPT49yps+Z9jsLD3fRSPrg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "hYEisV19Dxn4PvCvxJFm5A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "hgsVhmCR+D+pPaE1yMWDsg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "hjikQWtnmVPaWts63wYw4Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "hktk4wXij5O6pY5X6Pdp/Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "iMLMqCcRXnm6QslpJnCS7w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "iQByZpdRXgW/fl3SoDuoAA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "iXL2XPVys02jHcobuV/7zQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "ipG1YUFrN7KyPdU8o+2M6Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "irdTBCwmsDefJyVDw+cS3A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "iswhVSntR4QnIsTAyM6ydQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "it/1dAj/Yqoy0694vv9wUA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "ix3lD4/Nn7qLbcpDm0AIhg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "j+mzBjs+9Rp1lGL7uVd5sA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "j5BITKK/PhtJBhR0Qn0Ziw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "j5f/exLQUf/AfnuQvtw1ag==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "jAjaNW7NMGiv7HfByDu4RQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "jDIVpAdvhjPN/gmOBNQuag==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "jH43ZEoPP2TpNiUJXUizMw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "jMxy8GAhrrA2mTT5vqlfcg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "jXo3rXdhdYGkiXYZpQxZ3Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "jrYNd66NtmHdHhjnoxRx/A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "jxodkkAvUPklQOkQf5mRGQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "k0H4b6XNielCqxta/CRiLQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "kDzRHkg3txncDWuyd5771g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "kFxhSjWy84mTZBM4XiZaeQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "kUBCI82medWnoqu0XgvJJg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "kaLLRnNrSxtvkSdcliuniA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "kigiD4fuysu8/DeCr+ONKQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "kp6BaioAZ30jbVeZkkzokA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "kqjucdtmnvYZVSGwSyc0aA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "l/3ul+K857h8xvvKgPPc8A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "l36Y8lL0dC04c9AnKIpOCw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "lIAKRJe70medmtteiMTNkw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "lNWcYbl6h71sUZV6B4E+bw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "lV2MRz2nTh21rS47LJ6XIQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "lbcitH3ttNejz+IVDee9kA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "lqKUNuoxzC8zSaSnPi26WQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "m0hcMUeRLwmMKjncCWQ1wQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "m7hOFCjo7x6PMvux7htFOg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "mK/FUfODp3MR7WS2xegPsw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "mPqGnMbiXN6jP61aGbHvOA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "mWpxQAUiV6nN451/LkTR5w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "meyF9qLalTOagADXp9lO7Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "n/QavSZA9Po4xvQu/EMavg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "n7aNrQrPqOi9MYUVRT/saQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "n7mOL22NuOUufoEmlGqORw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "na4ojyfFHL07xf5Yr8wxsg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "niuM5rOifNUdHg6kcArzvw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "nqniqNEVhrfub8cS+os87A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "nuIyutUqK6hTmg/S9ojklw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "oIqBLVUdTw3vIPAyQdS/tA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "oK41W21MyjS/j+5BoCQjuA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "obNuQXzAwE3TzjUoRN1yEw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "osuCNzTJ+Fjh0P4Yfe9E1g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "p7SpaXJk05lb33Ey0lqxHw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "p9E62zY/VzvgMSvTX9UkJg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "pvBQbvRSWZsI3DUucyjs+A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "q4zKXqPU+5vLvZLEG6zEXw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "q8h8ag3Ho33Zc/60lMOvVA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "qGKV3oqLguMWpyzvjv1+wg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "qKN/Sy8G7n1xl+F5J1m1bg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "qYSZ6aKFWol313IOGRXaug==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "qc0Yt1AzZC+CY6qdjO+fZA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "qco/AqMt9denZ9GeHFnEaA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "qklPItzKPipAd2a3RHZZIA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "qsJmM3aYeYGdvjHxtaNdaQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "r0GDCuRXOUGVJzCqB4JFMw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "rCLp3m64Catai9VuHvh3Lw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "rEU0uZUpz06y9hg0ORc49A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "rUUieTQ6JPdOKUOFRfhvNw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "rY/kE/V4JnxYoqV+lmc9mg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "rZckolqfVnE7xInGZn5Zzw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "rd4/gPEUtK2p++ni1m1dDg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "rflqn7XKJvnH8dP67kgM7A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "rj2k4My0f4W7sR9R0rDeJg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "rlHYqOr0lkUB/Gs6b1kD2g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "s/zVhVCY3vRmmv6PJdGLCg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "sE1EmQ5Nhv4P4rilE6lODw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "sKD1m/Tx9mlFSspWqkqwXA==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:7102a2cde127306f405785c2bcbe536e4aeaaa13e256f30dd671a6083b805b89", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "sOl5EHhMcC/OeH5rJHkypQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "sXA/H9XX1FCBnut09ugTOw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "sZC9JChvb46EmDWlVsLY4Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "ssPaV1VLDu6d5ZJ6Rrmh3A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "su3U01UxGSz5b2TyKbsC/w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "sukNATkcLkohYgGrhDtrZA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "svMaWd1Pkq6Z/UDBHTpApg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "sx0C6L5COHIkv6yQQyPlbw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "t28Zc7/vifVyS7O17xTUSA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "tGPn3pK3U8y547XMf1WmhQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "tWWw65aFr0Her+B1hlgbqA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "tYvC71hd5ARf4WITmeyfxA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "ttbQC41rI30fYBaVUH1hLQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "txEovS086NkVY5rNikpoEA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "u5TyEoU5GA6Z2czzwhMLiA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "v6X9Dt1wPw8fK6VaHz1Ffw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "v9Q18SPC524XLCjLQkFyLg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "vXRu1n6ncYWvB8yrZupytw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "vw1F3IS9ZqFqIEU3E24hLQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "w2DoavvB02S/+BS01jQqJw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "w9ndxjIpPQXv3PDulnya7A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "wCA3gMNtInqX1xg18QcnQg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "wKkzDAoEH1CCGQWghKjKdA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "wVOHUaFC3qlk+Ft1W2VH7A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "wYIIhtw19AhoRPO0XAvoxw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "wdMozBSF06uhI4HOI003SQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "wfJGCqOH8d+IYg/dAepx1A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "wvtx3JsOUmPyorardjeYSQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "ww1NPX/mwmdtd47p1Hp8FQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "x4oijVhQU8BUwJwoFvk4QA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "xGsFnJNA7f9q/+8cz1QFqg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "xItFXMbfthPTJh/VhaoYeA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "xTea8RVD9wez5DTFDIkCYg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "xVpXFb43dZh4HfBX53yyew==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "xfiNHrth0bRlTgQnR3IgUw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "xgCGPQ7CZbjJqBTw2Nmu9w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:42e6a6a435918edd0f574c7f9b312037c492e77be862b463342ba37037be5d8c", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "41207915-8511-4e9f-b33b-fc46cd9def16", "7d22bd93-3685-40a0-bc8a-570859cc1547" ] } ], "xnmn6fk+/THLJg3emXYMww==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "xvET6Njr4M7QE6Z5iUtA9g==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "y8SuAyUvVIkzKZ1B4+P8EQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "y9sflCLWTaHWSSC+w8u7bQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "yEp9fQVFIQAEDPCwC3GLmA==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "yHwqZ1KSVBKOdg3PvZkURg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "yMfhY0UxLchgIpNP2r2lyQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "yU2oeSGRdhrEc6MC885lzw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "yY469KfvqdHWbJwmOcIU1Q==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "ycSS8xsUDu5nMwsql04xfQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "yjR8lvdxVJDPIeBNVwLrcA==": [ { "package_db": "python:opt/app-root/lib/python3.9/site-packages", "introduced_in": "sha256:7102a2cde127306f405785c2bcbe536e4aeaaa13e256f30dd671a6083b805b89", "distribution_id": "", "repository_ids": [ "43c8ba95-8e89-4c2d-b5dd-585efd9c5755" ] } ], "yr/wq9xPQXa1ScGcnndSag==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "z+4p7UhT99HApht5JWOY7w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "zDt2Vfv35KL/GbH9JG8H3A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "zIFn1hwQ+gf5tSEzT54ZNg==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "zLbmCpiDy68qsFvtKNzmgQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "zSH6RyP9GPyMR7PgpQVpgQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f4bcf908368c26067db4519f5646363ca7c726f901ffb84a01163268ad8e7ba5", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "0d5a1ba1-5272-4aeb-9d5e-deff3ee399c2", "885593ba-05cd-48de-82b5-b4b66155f04d" ] } ], "zYkGoXzaE5np8s88FoALNQ==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "zbfsUtSlKsegyV6mTxR13A==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:f8fe0499d2ad5092c7d5d5010ab3f3db5ff7670b956d06919f47909300f0ea0d", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "1f9dea12-6401-4343-bee0-854858fa2a92", "7e844200-81a8-4614-98bf-00707f419661" ] } ], "zfyfWkP+jPZaONI2HeiXQw==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "zmiWZ9YjduqgYQPI8rU4ug==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ], "zxuLMmxubC84XoLpkfxZ3w==": [ { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "", "repository_ids": null }, { "package_db": "sqlite:var/lib/rpm", "introduced_in": "sha256:486d847cf55c4e66fddefc15e70b667b8e2a4c7b1e82c8ce16454a7ce5dec240", "distribution_id": "38a7bc9f-3a35-41ef-8b88-c11074c9752a", "repository_ids": [ "c29e5af2-3470-4007-bea6-57aaeafd63ce", "bc59b935-5540-4ec5-9e69-ca28aee5bdfa" ] } ] }, "vulnerabilities": { "+PjI2yN4wCMPyf1oygeT5Q==": { "id": "+PjI2yN4wCMPyf1oygeT5Q==", "updater": "rhel-vex", "name": "CVE-2023-48237", "description": "A flaw was found in Vim, an open source command line text editor. In affected versions, when shifting lines in operator pending mode and using a large value, it may be possible to overflow the size of the integer. The impact is low because user interaction is required and a crash may not happen in all situations.", "issued": "2023-11-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-48237 https://bugzilla.redhat.com/show_bug.cgi?id=2250274 https://www.cve.org/CVERecord?id=CVE-2023-48237 https://nvd.nist.gov/vuln/detail/CVE-2023-48237 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/6bf131888a3d1de62bbfa8a7ea03c0ddccfd496e https://github.com/vim/vim/security/advisories/GHSA-f2m2-v387-gv87 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48237.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "+hBhqk1qKnkU+nqn6a96qg==": { "id": "+hBhqk1qKnkU+nqn6a96qg==", "updater": "rhel-vex", "name": "CVE-2023-48233", "description": "A flaw was found in Vim, an open source command line text editor. If the count after the :s command is larger than what fits into a signed long variable, abort with e_value_too_large. The impact is low because user interaction is required and a crash may not happen in all situations.", "issued": "2023-11-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-48233 https://bugzilla.redhat.com/show_bug.cgi?id=2250270 https://www.cve.org/CVERecord?id=CVE-2023-48233 https://nvd.nist.gov/vuln/detail/CVE-2023-48233 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78 https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48233.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "+o9j0Llb6+ISl2S6vmkRkQ==": { "id": "+o9j0Llb6+ISl2S6vmkRkQ==", "updater": "rhel-vex", "name": "CVE-2023-25434", "description": "A heap-based buffer overflow vulnerability was found in LibTIFF's tiffcrop utility in the extractContigSamplesBytes() function. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcrop utility, which causes an out-of-bounds read access resulting in an application crash, eventually leading to a denial of service.", "issued": "2023-06-14T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-25434 https://bugzilla.redhat.com/show_bug.cgi?id=2215209 https://www.cve.org/CVERecord?id=CVE-2023-25434 https://nvd.nist.gov/vuln/detail/CVE-2023-25434 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25434.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "+uMSPU5jbqI0+jsP/eX6PA==": { "id": "+uMSPU5jbqI0+jsP/eX6PA==", "updater": "rhel-vex", "name": "CVE-2022-3037", "description": "A flaw was found in vim, where it is vulnerable to a use-after-free in the qf_buf_add_line() function. This flaw allows a specially crafted file to crash a program, use unexpected values, or execute code.", "issued": "2022-08-30T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3037 https://bugzilla.redhat.com/show_bug.cgi?id=2122907 https://www.cve.org/CVERecord?id=CVE-2022-3037 https://nvd.nist.gov/vuln/detail/CVE-2022-3037 https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3037.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "/MgFHW097IAGIZkNc/Fltw==": { "id": "/MgFHW097IAGIZkNc/Fltw==", "updater": "rhel-vex", "name": "CVE-2025-5245", "description": "A denial-of-service vulnerability has been identified in GNU Binutils, affecting versions up to 2.44. The flaw resides within the debug_type_samep function in the /binutils/debug.c file of the objdump component. An attacker with local access can trigger a program crash by manipulating input data, leading to a denial of service for the objdump utility.", "issued": "2025-05-27T14:31:12Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5245 https://bugzilla.redhat.com/show_bug.cgi?id=2368771 https://www.cve.org/CVERecord?id=CVE-2025-5245 https://nvd.nist.gov/vuln/detail/CVE-2025-5245 https://sourceware.org/bugzilla/attachment.cgi?id=16004 https://sourceware.org/bugzilla/show_bug.cgi?id=32829 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a https://vuldb.com/?ctiid.310347 https://vuldb.com/?id.310347 https://vuldb.com/?submit.584635 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5245.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "/YcdipQjiqJUDpddwhDiIw==": { "id": "/YcdipQjiqJUDpddwhDiIw==", "updater": "rhel-vex", "name": "CVE-2022-2345", "description": "A use-after-free vulnerability was found in Vim in the skipwhite function in the charset.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, and cause the application to crash, possibly executing code and corrupting memory.", "issued": "2022-07-05T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2345 https://bugzilla.redhat.com/show_bug.cgi?id=2106775 https://www.cve.org/CVERecord?id=CVE-2022-2345 https://nvd.nist.gov/vuln/detail/CVE-2022-2345 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2345.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "/rVEaWl0l9u8biVEKbZTFg==": { "id": "/rVEaWl0l9u8biVEKbZTFg==", "updater": "rhel-vex", "name": "CVE-2023-50495", "description": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().", "issued": "2023-12-12T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-50495 https://bugzilla.redhat.com/show_bug.cgi?id=2254244 https://www.cve.org/CVERecord?id=CVE-2023-50495 https://nvd.nist.gov/vuln/detail/CVE-2023-50495 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-50495.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "ncurses", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "/wfob5jHHezdiyugtfPWjg==": { "id": "/wfob5jHHezdiyugtfPWjg==", "updater": "rhel-vex", "name": "CVE-2021-45261", "description": "A flaw was found in patch. A possible memory corruption vulnerability could allow an attacker to input a specially crafted patch file leading to a crash or code execution.", "issued": "2021-12-22T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-45261 https://bugzilla.redhat.com/show_bug.cgi?id=2035081 https://www.cve.org/CVERecord?id=CVE-2021-45261 https://nvd.nist.gov/vuln/detail/CVE-2021-45261 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-45261.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "patch", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "00cDk2w3qfvdzMbO27c/+w==": { "id": "00cDk2w3qfvdzMbO27c/+w==", "updater": "rhel-vex", "name": "CVE-2022-2982", "description": "A heap use-after-free vulnerability was found in vim's qf_fill_buffer() function of the src/quickfix.c file. The issue occurs because vim uses freed memory when recursively using 'quickfixtextfunc.' This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-08-25T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2982 https://bugzilla.redhat.com/show_bug.cgi?id=2123714 https://www.cve.org/CVERecord?id=CVE-2022-2982 https://nvd.nist.gov/vuln/detail/CVE-2022-2982 https://huntr.dev/bounties/53f53d9a-ba8a-4985-b7ba-23efbe6833be/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2982.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "0ISEnYRRDkbJFXBP9XvdpA==": { "id": "0ISEnYRRDkbJFXBP9XvdpA==", "updater": "rhel-vex", "name": "CVE-2025-11731", "description": "A flaw was found in the exsltFuncResultComp() function of libxslt, which handles EXSLT \u003cfunc:result\u003e elements during stylesheet parsing. Due to improper type handling, the function may treat an XML document node as a regular XML element node, resulting in a type confusion. This can cause unexpected memory reads and potential crashes. While difficult to exploit, the flaw could lead to application instability or denial of service.", "issued": "2025-10-14T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11731 https://bugzilla.redhat.com/show_bug.cgi?id=2403688 https://www.cve.org/CVERecord?id=CVE-2025-11731 https://nvd.nist.gov/vuln/detail/CVE-2025-11731 https://gitlab.gnome.org/GNOME/libxslt/-/merge_requests/78 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11731.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libxslt", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "0YVxD0vSH+0MhijemP/Jmg==": { "id": "0YVxD0vSH+0MhijemP/Jmg==", "updater": "rhel-vex", "name": "CVE-2022-3705", "description": "A use-after-free flaw was found in the qf_update_buffer function in vim. This issue allows a specially crafted file to crash a program, use unexpected values, or execute code.", "issued": "2022-10-26T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3705 https://bugzilla.redhat.com/show_bug.cgi?id=2139086 https://www.cve.org/CVERecord?id=CVE-2022-3705 https://nvd.nist.gov/vuln/detail/CVE-2022-3705 https://vuldb.com/?id.212324 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3705.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "0bK7Vo3x9SXQYvDvMmgzXA==": { "id": "0bK7Vo3x9SXQYvDvMmgzXA==", "updater": "rhel-vex", "name": "CVE-2022-2208", "description": "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.", "issued": "2022-06-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2208 https://bugzilla.redhat.com/show_bug.cgi?id=2102183 https://www.cve.org/CVERecord?id=CVE-2022-2208 https://nvd.nist.gov/vuln/detail/CVE-2022-2208 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2208.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "0u2Zo3eZYFAXhVSIZh+vXQ==": { "id": "0u2Zo3eZYFAXhVSIZh+vXQ==", "updater": "rhel-vex", "name": "CVE-2017-16232", "description": "LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue", "issued": "2017-11-01T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2017-16232 https://bugzilla.redhat.com/show_bug.cgi?id=1516189 https://www.cve.org/CVERecord?id=CVE-2017-16232 https://nvd.nist.gov/vuln/detail/CVE-2017-16232 https://security.access.redhat.com/data/csaf/v2/vex/2017/cve-2017-16232.json", "severity": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "0v5F4x1W0RxkklLvRs6NKQ==": { "id": "0v5F4x1W0RxkklLvRs6NKQ==", "updater": "rhel-vex", "name": "CVE-2023-0433", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.", "issued": "2023-01-21T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-0433 https://bugzilla.redhat.com/show_bug.cgi?id=2163612 https://www.cve.org/CVERecord?id=CVE-2023-0433 https://nvd.nist.gov/vuln/detail/CVE-2023-0433 https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0433.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "19Kvl4LS7MCiBo2cRD5fxQ==": { "id": "19Kvl4LS7MCiBo2cRD5fxQ==", "updater": "rhel-vex", "name": "CVE-2021-3974", "description": "A flaw was found in vim. A possible use-after-free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability.", "issued": "2021-11-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-3974 https://bugzilla.redhat.com/show_bug.cgi?id=2025061 https://www.cve.org/CVERecord?id=CVE-2021-3974 https://nvd.nist.gov/vuln/detail/CVE-2021-3974 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3974.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "1WQ/LJu/kefEuHRv58l0Lw==": { "id": "1WQ/LJu/kefEuHRv58l0Lw==", "updater": "rhel-vex", "name": "CVE-2023-4734", "description": "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846.", "issued": "2023-09-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-4734 https://bugzilla.redhat.com/show_bug.cgi?id=2237161 https://www.cve.org/CVERecord?id=CVE-2023-4734 https://nvd.nist.gov/vuln/detail/CVE-2023-4734 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4734.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "2I/0B+uXhxpPJWXGwNGlLw==": { "id": "2I/0B+uXhxpPJWXGwNGlLw==", "updater": "rhel-vex", "name": "CVE-2023-5344", "description": "A heap-based buffer overflow vulnerability was found in Vim's trunc_string() function of the src/message.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap-based buffer overflow that causes an application to crash, leading to a denial of service.", "issued": "2023-10-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-5344 https://bugzilla.redhat.com/show_bug.cgi?id=2242141 https://www.cve.org/CVERecord?id=CVE-2023-5344 https://nvd.nist.gov/vuln/detail/CVE-2023-5344 https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5344.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "2RZ3u6UmceVG9iB/xb73SA==": { "id": "2RZ3u6UmceVG9iB/xb73SA==", "updater": "rhel-vex", "name": "CVE-2022-2206", "description": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "issued": "2022-06-26T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2206 https://bugzilla.redhat.com/show_bug.cgi?id=2102188 https://www.cve.org/CVERecord?id=CVE-2022-2206 https://nvd.nist.gov/vuln/detail/CVE-2022-2206 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2206.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "2SApI7oHpcm9Z48+2Hj11w==": { "id": "2SApI7oHpcm9Z48+2Hj11w==", "updater": "rhel-vex", "name": "CVE-2025-5915", "description": "A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.", "issued": "2025-05-20T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5915 https://bugzilla.redhat.com/show_bug.cgi?id=2370865 https://www.cve.org/CVERecord?id=CVE-2025-5915 https://nvd.nist.gov/vuln/detail/CVE-2025-5915 https://github.com/libarchive/libarchive/pull/2599 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5915.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "2TDjlt2gAEWsLyBBPigFYw==": { "id": "2TDjlt2gAEWsLyBBPigFYw==", "updater": "rhel-vex", "name": "CVE-2024-13176", "description": "A timing side-channel vulnerability was found in OpenSSL. This vulnerability allows an attacker to recover the private key. However, measuring the timing would require local access to the signing application or a fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This issue can happen with significant probability only for some of the supported elliptic curves. In particular, the NIST P-521 curve is affected.", "issued": "2025-01-20T13:29:57Z", "links": "https://access.redhat.com/security/cve/CVE-2024-13176 https://bugzilla.redhat.com/show_bug.cgi?id=2338999 https://www.cve.org/CVERecord?id=CVE-2024-13176 https://nvd.nist.gov/vuln/detail/CVE-2024-13176 https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13176.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Low", "package": { "id": "", "name": "openssl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "2UHqEqfMIIn53NkDlDEppQ==": { "id": "2UHqEqfMIIn53NkDlDEppQ==", "updater": "rhel-vex", "name": "CVE-2022-2923", "description": "A flaw was found in vim, where it is vulnerable to a NULL pointer dereference in the sug_filltree function. This flaw allows a specially crafted file to crash the software.", "issued": "2022-08-22T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2923 https://bugzilla.redhat.com/show_bug.cgi?id=2120989 https://www.cve.org/CVERecord?id=CVE-2022-2923 https://nvd.nist.gov/vuln/detail/CVE-2022-2923 https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2923.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "2luu38jiVQvy6qOXHFgpAg==": { "id": "2luu38jiVQvy6qOXHFgpAg==", "updater": "rhel-vex", "name": "CVE-2022-2042", "description": "A heap use-after-free vulnerability was found in Vim's skipwhite() function of the src/charset.c file. This flaw occurs because of an uninitialized attribute value and freed memory in the spell command. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash and corrupt memory.", "issued": "2022-06-10T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2042 https://bugzilla.redhat.com/show_bug.cgi?id=2097768 https://www.cve.org/CVERecord?id=CVE-2022-2042 https://nvd.nist.gov/vuln/detail/CVE-2022-2042 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2042.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "2sm08sXcjWtT2Gtu3CdSug==": { "id": "2sm08sXcjWtT2Gtu3CdSug==", "updater": "rhel-vex", "name": "CVE-2022-1725", "description": "A NULL pointer dereference vulnerability was found in Vim's vim_regexec_string() function of the src/regexp.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL pointer dereference that causes a denial of service.", "issued": "2022-09-29T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-1725 https://bugzilla.redhat.com/show_bug.cgi?id=2132561 https://www.cve.org/CVERecord?id=CVE-2022-1725 https://nvd.nist.gov/vuln/detail/CVE-2022-1725 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1725.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "3Lvdmj//2sze9S8I3n8yrw==": { "id": "3Lvdmj//2sze9S8I3n8yrw==", "updater": "rhel-vex", "name": "CVE-2023-0288", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1189.", "issued": "2023-01-12T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-0288 https://bugzilla.redhat.com/show_bug.cgi?id=2163130 https://www.cve.org/CVERecord?id=CVE-2023-0288 https://nvd.nist.gov/vuln/detail/CVE-2023-0288 https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0288.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "3WRC4Vl08/leTJ1MFHuCEg==": { "id": "3WRC4Vl08/leTJ1MFHuCEg==", "updater": "rhel-vex", "name": "CVE-2022-3297", "description": "A heap use-after-free vulnerability was found in Vim's process_next_cpt_value() function of the src/insexpand.c file. This flaw occurs due to the usage of freed memory when 'tagfunc' wipes out the buffer that holds 'complete.' This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free issue that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-09-25T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3297 https://bugzilla.redhat.com/show_bug.cgi?id=2129838 https://www.cve.org/CVERecord?id=CVE-2022-3297 https://nvd.nist.gov/vuln/detail/CVE-2022-3297 https://huntr.dev/bounties/1aa9ec92-0355-4710-bf85-5bce9effa01c https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3297.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "4LZWGm07jnOHHBGX2FzAwg==": { "id": "4LZWGm07jnOHHBGX2FzAwg==", "updater": "rhel-vex", "name": "CVE-2025-1153", "description": "A flaw was found in GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.", "issued": "2025-02-10T19:00:13Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1153 https://bugzilla.redhat.com/show_bug.cgi?id=2344743 https://www.cve.org/CVERecord?id=CVE-2025-1153 https://nvd.nist.gov/vuln/detail/CVE-2025-1153 https://sourceware.org/bugzilla/show_bug.cgi?id=32603 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150 https://vuldb.com/?ctiid.295057 https://vuldb.com/?id.295057 https://vuldb.com/?submit.489991 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1153.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "4cQAenzXciR7rLlEmdwZsQ==": { "id": "4cQAenzXciR7rLlEmdwZsQ==", "updater": "rhel-vex", "name": "CVE-2025-11494", "description": "A vulnerability was found in GNU Binutils 2.45. Impacted is the function _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is identified as b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a. A patch should be applied to remediate this issue.", "issued": "2025-10-08T19:32:07Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11494 https://bugzilla.redhat.com/show_bug.cgi?id=2402559 https://www.cve.org/CVERecord?id=CVE-2025-11494 https://nvd.nist.gov/vuln/detail/CVE-2025-11494 https://sourceware.org/bugzilla/attachment.cgi?id=16389 https://sourceware.org/bugzilla/show_bug.cgi?id=33499 https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a https://vuldb.com/?ctiid.327619 https://vuldb.com/?id.327619 https://vuldb.com/?submit.668281 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11494.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "4vHE1o0sxmJSfgr6AiAtqA==": { "id": "4vHE1o0sxmJSfgr6AiAtqA==", "updater": "rhel-vex", "name": "CVE-2025-3198", "description": "A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.", "issued": "2025-04-04T01:31:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-3198 https://bugzilla.redhat.com/show_bug.cgi?id=2357358 https://www.cve.org/CVERecord?id=CVE-2025-3198 https://nvd.nist.gov/vuln/detail/CVE-2025-3198 https://sourceware.org/bugzilla/show_bug.cgi?id=32716 https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d https://vuldb.com/?ctiid.303151 https://vuldb.com/?id.303151 https://vuldb.com/?submit.545773 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3198.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "5D5WFK01Su4Lrj4hhwDYGQ==": { "id": "5D5WFK01Su4Lrj4hhwDYGQ==", "updater": "rhel-vex", "name": "CVE-2024-43374", "description": "A heap use-after-free vulnerability was found in Vim's alist_add() function. Adding a new file to the argument list triggers Buf* autocommands. In an autocommand, if the buffer that was just opened is closed, including the window where it is shown, it causes the window structure to be freed, containing a reference to the argument list that is being modified. Once the autocommands are completed, references to the window and argument list are no longer valid, causing a use-after-free issue. To trigger this issue, a local attacker or user must add unusual autocommands that wipe a buffer during creation, either manually or by sourcing a malicious plugin, which will cause Vim to crash.", "issued": "2024-08-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-43374 https://bugzilla.redhat.com/show_bug.cgi?id=2305259 https://www.cve.org/CVERecord?id=CVE-2024-43374 https://nvd.nist.gov/vuln/detail/CVE-2024-43374 https://github.com/vim/vim/commit/0a6e57b09bc8c76691b367a5babfb79b31b770e8 https://github.com/vim/vim/security/advisories/GHSA-2w8m-443v-cgvw https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-43374.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "6GILJqctNxTbZFPR6fLtoA==": { "id": "6GILJqctNxTbZFPR6fLtoA==", "updater": "rhel-vex", "name": "CVE-2024-12086", "description": "A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.", "issued": "2025-01-14T15:06:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-12086 https://bugzilla.redhat.com/show_bug.cgi?id=2330577 https://www.cve.org/CVERecord?id=CVE-2024-12086 https://nvd.nist.gov/vuln/detail/CVE-2024-12086 https://kb.cert.org/vuls/id/952657 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-12086.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "rsync", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "6J86dffyd+kQEKbjTTbD2Q==": { "id": "6J86dffyd+kQEKbjTTbD2Q==", "updater": "rhel-vex", "name": "CVE-2023-1916", "description": "A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure.", "issued": "2023-03-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-1916 https://bugzilla.redhat.com/show_bug.cgi?id=2185074 https://www.cve.org/CVERecord?id=CVE-2023-1916 https://nvd.nist.gov/vuln/detail/CVE-2023-1916 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1916.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "6MW1lRUdNNc4s+6uD2JNvw==": { "id": "6MW1lRUdNNc4s+6uD2JNvw==", "updater": "rhel-vex", "name": "CVE-2022-2286", "description": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", "issued": "2022-07-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2286 https://bugzilla.redhat.com/show_bug.cgi?id=2103875 https://www.cve.org/CVERecord?id=CVE-2022-2286 https://nvd.nist.gov/vuln/detail/CVE-2022-2286 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2286.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "6asSIEJz7ggo9QEXpbSOYg==": { "id": "6asSIEJz7ggo9QEXpbSOYg==", "updater": "rhel-vex", "name": "CVE-2023-48236", "description": "A flaw was found in Vim, an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. The impact is low because user interaction is required and a crash may not happen in all situations.", "issued": "2023-11-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-48236 https://bugzilla.redhat.com/show_bug.cgi?id=2250273 https://www.cve.org/CVERecord?id=CVE-2023-48236 https://nvd.nist.gov/vuln/detail/CVE-2023-48236 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968 https://github.com/vim/vim/security/advisories/GHSA-pr4c-932v-8hx5 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48236.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "6dwQWrojfQ/1hgTT2PQckg==": { "id": "6dwQWrojfQ/1hgTT2PQckg==", "updater": "rhel-vex", "name": "CVE-2022-2129", "description": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", "issued": "2022-06-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2129 https://bugzilla.redhat.com/show_bug.cgi?id=2099586 https://www.cve.org/CVERecord?id=CVE-2022-2129 https://nvd.nist.gov/vuln/detail/CVE-2022-2129 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2129.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "6hAQW3vY9ZA/8datv1rY4g==": { "id": "6hAQW3vY9ZA/8datv1rY4g==", "updater": "rhel-vex", "name": "CVE-2024-41996", "description": "A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server's public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.", "issued": "2024-08-26T06:15:04Z", "links": "https://access.redhat.com/security/cve/CVE-2024-41996 https://bugzilla.redhat.com/show_bug.cgi?id=2307826 https://www.cve.org/CVERecord?id=CVE-2024-41996 https://nvd.nist.gov/vuln/detail/CVE-2024-41996 https://dheatattack.gitlab.io/details/ https://dheatattack.gitlab.io/faq/ https://gist.github.com/c0r0n3r/abccc14d4d96c0442f3a77fa5ca255d1 https://github.com/openssl/openssl/issues/17374 https://openssl-library.org/post/2022-10-21-tls-groups-configuration/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41996.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "openssl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "6o8ui0RxMttDzkyqTDO5tg==": { "id": "6o8ui0RxMttDzkyqTDO5tg==", "updater": "rhel-vex", "name": "CVE-2022-1616", "description": "A flaw was found in vim, which is vulnerable to a heap-buffer-overflow in append_command of the src/ex_docmd.c function. This flaw allows a specially crafted file to crash software, modify memory, or execute code when opened in vim.", "issued": "2022-05-07T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-1616 https://bugzilla.redhat.com/show_bug.cgi?id=2083017 https://www.cve.org/CVERecord?id=CVE-2022-1616 https://nvd.nist.gov/vuln/detail/CVE-2022-1616 https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1616.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "7+zZLUPhCOA3BFrcusoKFg==": { "id": "7+zZLUPhCOA3BFrcusoKFg==", "updater": "rhel-vex", "name": "CVE-2025-1152", "description": "A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.", "issued": "2025-02-10T18:00:09Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1152 https://bugzilla.redhat.com/show_bug.cgi?id=2344723 https://www.cve.org/CVERecord?id=CVE-2025-1152 https://nvd.nist.gov/vuln/detail/CVE-2025-1152 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295056 https://vuldb.com/?id.295056 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1152.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "7AoZZiCMmvqX9d9WD62FnQ==": { "id": "7AoZZiCMmvqX9d9WD62FnQ==", "updater": "rhel-vex", "name": "CVE-2023-4781", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.", "issued": "2023-09-05T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-4781 https://bugzilla.redhat.com/show_bug.cgi?id=2237575 https://www.cve.org/CVERecord?id=CVE-2023-4781 https://nvd.nist.gov/vuln/detail/CVE-2023-4781 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4781.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "7S6xxC9g1Ybp0dqQ63V8tg==": { "id": "7S6xxC9g1Ybp0dqQ63V8tg==", "updater": "rhel-vex", "name": "CVE-2023-40403", "description": "A flaw was found in libxslt package. Processing web content may disclose sensitive information. This issue was addressed with improved memory handling.", "issued": "2023-09-26T20:14:54Z", "links": "https://access.redhat.com/security/cve/CVE-2023-40403 https://bugzilla.redhat.com/show_bug.cgi?id=2349766 https://www.cve.org/CVERecord?id=CVE-2023-40403 https://nvd.nist.gov/vuln/detail/CVE-2023-40403 http://seclists.org/fulldisclosure/2023/Oct/10 http://seclists.org/fulldisclosure/2023/Oct/3 http://seclists.org/fulldisclosure/2023/Oct/4 http://seclists.org/fulldisclosure/2023/Oct/5 http://seclists.org/fulldisclosure/2023/Oct/6 http://seclists.org/fulldisclosure/2023/Oct/8 http://seclists.org/fulldisclosure/2023/Oct/9 https://bugs.chromium.org/p/chromium/issues/detail?id=1356211 https://bugzilla.gnome.org/show_bug.cgi?id=751621 https://gitlab.gnome.org/GNOME/libxslt/-/issues/94 https://support.apple.com/en-us/HT213927 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-40403.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "libxslt", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "7cHovEEcBoQ92zXTfFigow==": { "id": "7cHovEEcBoQ92zXTfFigow==", "updater": "rhel-vex", "name": "CVE-2025-9232", "description": "Issue summary: An application using the OpenSSL HTTP client API functions may\ntrigger an out-of-bounds read if the 'no_proxy' environment variable is set and\nthe host portion of the authority component of the HTTP URL is an IPv6 address.\n\nImpact summary: An out-of-bounds read can trigger a crash which leads to\nDenial of Service for an application.\n\nThe OpenSSL HTTP client API functions can be used directly by applications\nbut they are also used by the OCSP client functions and CMP (Certificate\nManagement Protocol) client implementation in OpenSSL. However the URLs used\nby these implementations are unlikely to be controlled by an attacker.\n\nIn this vulnerable code the out of bounds read can only trigger a crash.\nFurthermore the vulnerability requires an attacker-controlled URL to be\npassed from an application to the OpenSSL function and the user has to have\na 'no_proxy' environment variable set. For the aforementioned reasons the\nissue was assessed as Low severity.\n\nThe vulnerable code was introduced in the following patch releases:\n3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the HTTP client implementation is outside the OpenSSL FIPS module\nboundary.", "issued": "2025-09-30T23:59:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9232 https://bugzilla.redhat.com/show_bug.cgi?id=2396056 https://www.cve.org/CVERecord?id=CVE-2025-9232 https://nvd.nist.gov/vuln/detail/CVE-2025-9232 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9232.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "openssl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "89XrIFUuuXy08LkDR6XMOw==": { "id": "89XrIFUuuXy08LkDR6XMOw==", "updater": "rhel-vex", "name": "CVE-2021-31879", "description": "A flaw was found in wget. If wget sends an Authorization header as part of a query and receives an HTTP REDIRECT to a third party in return, the Authorization header will be forwarded as part of the redirected request. This issue creates a password leak, as the second server receives the password. The highest threat from this vulnerability is confidentiality.", "issued": "2019-10-04T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-31879 https://bugzilla.redhat.com/show_bug.cgi?id=1955316 https://www.cve.org/CVERecord?id=CVE-2021-31879 https://nvd.nist.gov/vuln/detail/CVE-2021-31879 https://savannah.gnu.org/bugs/?56909 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-31879.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "wget", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "8QRmG/+fMsQQzP2maaxOag==": { "id": "8QRmG/+fMsQQzP2maaxOag==", "updater": "rhel-vex", "name": "CVE-2025-48386", "description": "A credential handling flaw has been discovered in git. The wincred credential helper uses a static buffer (target) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it with wcsncat(), which can lead to buffer overflows.", "issued": "2025-07-08T18:23:41Z", "links": "https://access.redhat.com/security/cve/CVE-2025-48386 https://bugzilla.redhat.com/show_bug.cgi?id=2378807 https://www.cve.org/CVERecord?id=CVE-2025-48386 https://nvd.nist.gov/vuln/detail/CVE-2025-48386 https://github.com/git/git/security/advisories/GHSA-4v56-3xvj-xvfr https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-48386.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "git", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "8efBqSZ3OYqd+nT8a21FNA==": { "id": "8efBqSZ3OYqd+nT8a21FNA==", "updater": "rhel-vex", "name": "CVE-2022-2287", "description": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", "issued": "2022-07-03T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2287 https://bugzilla.redhat.com/show_bug.cgi?id=2103876 https://www.cve.org/CVERecord?id=CVE-2022-2287 https://nvd.nist.gov/vuln/detail/CVE-2022-2287 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2287.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "8ge47rqVvHaefMV4OlZnlQ==": { "id": "8ge47rqVvHaefMV4OlZnlQ==", "updater": "rhel-vex", "name": "CVE-2022-2845", "description": "Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.\n\n", "issued": "2022-08-17T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2845 https://bugzilla.redhat.com/show_bug.cgi?id=2119844 https://www.cve.org/CVERecord?id=CVE-2022-2845 https://nvd.nist.gov/vuln/detail/CVE-2022-2845 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2845.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "8kndQj/aRn+NNJdGVP9v4g==": { "id": "8kndQj/aRn+NNJdGVP9v4g==", "updater": "rhel-vex", "name": "CVE-2023-45322", "description": "A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.", "issued": "2023-08-23T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-45322 https://bugzilla.redhat.com/show_bug.cgi?id=2242945 https://www.cve.org/CVERecord?id=CVE-2023-45322 https://nvd.nist.gov/vuln/detail/CVE-2023-45322 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45322.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "libxml2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "93O9BjbBwz1jYmTNCzgkUw==": { "id": "93O9BjbBwz1jYmTNCzgkUw==", "updater": "rhel-vex", "name": "CVE-2022-2849", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.", "issued": "2022-08-17T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2849 https://bugzilla.redhat.com/show_bug.cgi?id=2122137 https://www.cve.org/CVERecord?id=CVE-2022-2849 https://nvd.nist.gov/vuln/detail/CVE-2022-2849 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2849.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "9avTgsTrB6zaN8UjZ37Wow==": { "id": "9avTgsTrB6zaN8UjZ37Wow==", "updater": "rhel-vex", "name": "CVE-2022-3153", "description": "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.", "issued": "2022-09-08T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3153 https://bugzilla.redhat.com/show_bug.cgi?id=2126401 https://www.cve.org/CVERecord?id=CVE-2022-3153 https://nvd.nist.gov/vuln/detail/CVE-2022-3153 https://huntr.dev/bounties/68331124-620d-48bc-a8fa-cd947b26270a/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3153.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "AD3UsMwxeXvBzVWIm5l5yw==": { "id": "AD3UsMwxeXvBzVWIm5l5yw==", "updater": "rhel-vex", "name": "CVE-2025-5278", "description": "A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.", "issued": "2025-05-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://www.cve.org/CVERecord?id=CVE-2025-5278 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5278.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "coreutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "AIlN8RmMOvhBveVuVAyHQQ==": { "id": "AIlN8RmMOvhBveVuVAyHQQ==", "updater": "rhel-vex", "name": "CVE-2022-2874", "description": "A NULL pointer dereference vulnerability was found in Vim in the generate_loadvar function in the vim9compile.c file. This flaw allows an attacker who can trick a user into processing a specially crafted file to trigger the NULL pointer dereference, causing the application to crash.", "issued": "2022-08-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2874 https://bugzilla.redhat.com/show_bug.cgi?id=2193207 https://www.cve.org/CVERecord?id=CVE-2022-2874 https://nvd.nist.gov/vuln/detail/CVE-2022-2874 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2874.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "AUiFITCnRjRxctzqqbDeeA==": { "id": "AUiFITCnRjRxctzqqbDeeA==", "updater": "rhel-vex", "name": "CVE-2022-3219", "description": "A vulnerability was found in GnuPG. GnuPG can spin on a relatively small input by crafting a public key with thousands of signatures attached and compressed down to a few kilobytes. This issue can potentially cause a denial of service.", "issued": "2022-09-15T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://www.cve.org/CVERecord?id=CVE-2022-3219 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://dev.gnupg.org/D556 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3219.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "gnupg2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Ah03jmj/7fQOqUbg05PtZg==": { "id": "Ah03jmj/7fQOqUbg05PtZg==", "updater": "rhel-vex", "name": "CVE-2023-0049", "description": "A flaw was found in vim, which is vulnerable to an out-of-bounds read in the build_stl_str_hl function. This flaw allows a specially crafted file to cause information disclosure, data integrity corruption, or crash the software.", "issued": "2023-01-04T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-0049 https://bugzilla.redhat.com/show_bug.cgi?id=2158269 https://www.cve.org/CVERecord?id=CVE-2023-0049 https://nvd.nist.gov/vuln/detail/CVE-2023-0049 https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0049.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Ar1hBHxUcHiCnqL+avGJRg==": { "id": "Ar1hBHxUcHiCnqL+avGJRg==", "updater": "rhel-vex", "name": "CVE-2025-11495", "description": "A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.", "issued": "2025-10-08T20:02:07Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11495 https://bugzilla.redhat.com/show_bug.cgi?id=2402584 https://www.cve.org/CVERecord?id=CVE-2025-11495 https://nvd.nist.gov/vuln/detail/CVE-2025-11495 https://sourceware.org/bugzilla/attachment.cgi?id=16393 https://sourceware.org/bugzilla/show_bug.cgi?id=33502 https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0 https://vuldb.com/?ctiid.327620 https://vuldb.com/?id.327620 https://vuldb.com/?submit.668290 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11495.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "AsiuN/8gu7sZ0PJCLihjmw==": { "id": "AsiuN/8gu7sZ0PJCLihjmw==", "updater": "rhel-vex", "name": "CVE-2025-4598", "description": "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.", "issued": "2025-05-29T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-4598 https://bugzilla.redhat.com/show_bug.cgi?id=2369242 https://www.cve.org/CVERecord?id=CVE-2025-4598 https://nvd.nist.gov/vuln/detail/CVE-2025-4598 https://www.openwall.com/lists/oss-security/2025/05/29/3 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4598.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "systemd", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Av6IvPz8z+8JAyypXmkbTA==": { "id": "Av6IvPz8z+8JAyypXmkbTA==", "updater": "rhel-vex", "name": "CVE-2025-23050", "description": "QLowEnergyController in Qt before 6.8.2 mishandles malformed Bluetooth ATT commands, leading to an out-of-bounds read (or division by zero). This is fixed in 5.15.19, 6.5.9, and 6.8.2.", "issued": "2025-10-31T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-23050 https://bugzilla.redhat.com/show_bug.cgi?id=2408769 https://www.cve.org/CVERecord?id=CVE-2025-23050 https://nvd.nist.gov/vuln/detail/CVE-2025-23050 https://codereview.qt-project.org/c/qt/qtconnectivity/+/614538 https://codereview.qt-project.org/q/QLowEnergyController https://www.qt.io/blog/security-advisory-qlowenergycontroller-on-linux https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-23050.json", "severity": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "qt5", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "AwYRRq6SmgfJLn2NZxQUdw==": { "id": "AwYRRq6SmgfJLn2NZxQUdw==", "updater": "rhel-vex", "name": "CVE-2024-34459", "description": "A flaw was found in the xmllint program distributed by the libxml2 package. A buffer over-read in the xmlHTMLPrintFileContext function in the xmllint.c file may be triggered when a crafted file is processed with the xmllint program using the `--htmlout` command line option, causing an application crash and resulting in a denial of service.", "issued": "2024-05-08T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-34459 https://bugzilla.redhat.com/show_bug.cgi?id=2280532 https://www.cve.org/CVERecord?id=CVE-2024-34459 https://nvd.nist.gov/vuln/detail/CVE-2024-34459 https://gitlab.gnome.org/GNOME/libxml2/-/issues/720 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-34459.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "libxml2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "BEXy4ijrTQIkl+xEVZQ61w==": { "id": "BEXy4ijrTQIkl+xEVZQ61w==", "updater": "rhel-vex", "name": "CVE-2025-61984", "description": "ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)", "issued": "2025-10-06T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-61984 https://bugzilla.redhat.com/show_bug.cgi?id=2401960 https://www.cve.org/CVERecord?id=CVE-2025-61984 https://nvd.nist.gov/vuln/detail/CVE-2025-61984 https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2 https://www.openssh.com/releasenotes.html#10.1p1 https://www.openwall.com/lists/oss-security/2025/10/06/1 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61984.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "openssh", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "BS5Qx6nN3HmM64VVoKmayw==": { "id": "BS5Qx6nN3HmM64VVoKmayw==", "updater": "rhel-vex", "name": "CVE-2022-3134", "description": "A heap use-after-free vulnerability was found in vim's do_tag() function of the src/tag.c file. The issue triggers when the 'tagfunc' closes the window. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-09-06T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3134 https://bugzilla.redhat.com/show_bug.cgi?id=2126085 https://www.cve.org/CVERecord?id=CVE-2022-3134 https://nvd.nist.gov/vuln/detail/CVE-2022-3134 https://huntr.dev/bounties/6ec79e49-c7ab-4cd6-a517-e7934c2eb9dc https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3134.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "BbM0NZsMsZnNUi1ybIzssw==": { "id": "BbM0NZsMsZnNUi1ybIzssw==", "updater": "rhel-vex", "name": "CVE-2025-1151", "description": "A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.", "issued": "2025-02-10T17:00:10Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1151 https://bugzilla.redhat.com/show_bug.cgi?id=2344713 https://www.cve.org/CVERecord?id=CVE-2025-1151 https://nvd.nist.gov/vuln/detail/CVE-2025-1151 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295055 https://vuldb.com/?id.295055 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1151.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "BfDjqoaYrd0NKCGGxtokTg==": { "id": "BfDjqoaYrd0NKCGGxtokTg==", "updater": "rhel-vex", "name": "CVE-2023-48231", "description": "A heap use-after-free flaw was found in the vim package. When executing a `:s` command for the first time and using a sub-replace-special atom inside the substitution, it is possible that the recursive `:s` call causes memory to be freed, which may later then be accessed by the initial `:s` command. This issue may result in Vim crashing.", "issued": "2023-11-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-48231 https://bugzilla.redhat.com/show_bug.cgi?id=2250268 https://www.cve.org/CVERecord?id=CVE-2023-48231 https://nvd.nist.gov/vuln/detail/CVE-2023-48231 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48231.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Bu9dxnhmsLXDd3x0oRPHfA==": { "id": "Bu9dxnhmsLXDd3x0oRPHfA==", "updater": "rhel-vex", "name": "CVE-2025-11413", "description": "A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds write in the bfd_putl64 function in the bfd/libbfd.c file due to an improper check, causing a crash and resulting in a denial of service.", "issued": "2025-10-07T22:02:12Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11413 https://bugzilla.redhat.com/show_bug.cgi?id=2402423 https://www.cve.org/CVERecord?id=CVE-2025-11413 https://nvd.nist.gov/vuln/detail/CVE-2025-11413 https://sourceware.org/bugzilla/show_bug.cgi?id=33456 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0 https://vuldb.com/?id.327349 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11413.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "C0udSo+foVK8TphEaJ9u7g==": { "id": "C0udSo+foVK8TphEaJ9u7g==", "updater": "rhel-vex", "name": "CVE-2017-1000383", "description": "It was found that emacs applies the opened file read permissions to the swap file, overriding the process' umask. An attacker might search for vim swap files, that were not deleted properly, in order to retrieve sensible data.", "issued": "2017-10-31T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2017-1000383 https://bugzilla.redhat.com/show_bug.cgi?id=1508788 https://www.cve.org/CVERecord?id=CVE-2017-1000383 https://nvd.nist.gov/vuln/detail/CVE-2017-1000383 https://security.access.redhat.com/data/csaf/v2/vex/2017/cve-2017-1000383.json", "severity": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Low", "package": { "id": "", "name": "emacs", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "CQPV/OxtJ+DwYc6C4gniNQ==": { "id": "CQPV/OxtJ+DwYc6C4gniNQ==", "updater": "rhel-vex", "name": "CVE-2022-47008", "description": "A memory leak was found in binutils in the make_tempdir and make_tempname functions. This flaw allows an attacker to use a set of steps to trigger a memory leak and perform a denial of service, resulting in a loss of the system's availability.", "issued": "2022-06-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-47008 https://bugzilla.redhat.com/show_bug.cgi?id=2233984 https://www.cve.org/CVERecord?id=CVE-2022-47008 https://nvd.nist.gov/vuln/detail/CVE-2022-47008 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47008.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "DDxCHnX+kCqcRQj9b90/cg==": { "id": "DDxCHnX+kCqcRQj9b90/cg==", "updater": "rhel-vex", "name": "CVE-2023-4156", "description": "A heap out-of-bounds read flaw was found in builtin.c in the gawk package. This issue may lead to a crash and could be used to read sensitive information.", "issued": "2023-06-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-4156 https://bugzilla.redhat.com/show_bug.cgi?id=2215930 https://www.cve.org/CVERecord?id=CVE-2023-4156 https://nvd.nist.gov/vuln/detail/CVE-2023-4156 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4156.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "gawk", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "DJqdVbXk9Oqvq0nS8VYv5Q==": { "id": "DJqdVbXk9Oqvq0nS8VYv5Q==", "updater": "rhel-vex", "name": "CVE-2025-11840", "description": "A weakness has been identified in GNU Binutils 2.45. The affected element is the function vfinfo of the file ldmisc.c. Executing manipulation can lead to out-of-bounds read. The attack can only be executed locally. The exploit has been made available to the public and could be exploited. This patch is called 16357. It is best practice to apply a patch to resolve this issue.", "issued": "2025-10-16T15:32:11Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11840 https://bugzilla.redhat.com/show_bug.cgi?id=2404481 https://www.cve.org/CVERecord?id=CVE-2025-11840 https://nvd.nist.gov/vuln/detail/CVE-2025-11840 https://sourceware.org/bugzilla/attachment.cgi?id=16351 https://sourceware.org/bugzilla/attachment.cgi?id=16357 https://sourceware.org/bugzilla/show_bug.cgi?id=33455 https://vuldb.com/?ctiid.328775 https://vuldb.com/?id.328775 https://vuldb.com/?submit.661281 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11840.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "DNd0sdbW83acQbIl3FDaPw==": { "id": "DNd0sdbW83acQbIl3FDaPw==", "updater": "rhel-vex", "name": "CVE-2023-0054", "description": "An out-of-bounds write flaw was found in Vim, in the do_string_sub function in the eval.c file. The issue occurs because of an invalid memory access due to a missing check of the return value of the vim_regsub function when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file to trigger the out-of-bounds write, causing the application to crash.", "issued": "2023-01-03T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-0054 https://bugzilla.redhat.com/show_bug.cgi?id=2161349 https://www.cve.org/CVERecord?id=CVE-2023-0054 https://nvd.nist.gov/vuln/detail/CVE-2023-0054 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0054.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "DtWvIa+898xLj3Yf8kKjtA==": { "id": "DtWvIa+898xLj3Yf8kKjtA==", "updater": "rhel-vex", "name": "CVE-2025-11082", "description": "A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with \"[f]ixed for 2.46\".", "issued": "2025-09-27T22:32:09Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11082 https://bugzilla.redhat.com/show_bug.cgi?id=2399943 https://www.cve.org/CVERecord?id=CVE-2025-11082 https://nvd.nist.gov/vuln/detail/CVE-2025-11082 https://sourceware.org/bugzilla/attachment.cgi?id=16358 https://sourceware.org/bugzilla/show_bug.cgi?id=33464 https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8 https://vuldb.com/?ctiid.326123 https://vuldb.com/?id.326123 https://vuldb.com/?submit.661276 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11082.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "DtkRUkQTzcJrj8ZsC36kqQ==": { "id": "DtkRUkQTzcJrj8ZsC36kqQ==", "updater": "rhel-vex", "name": "CVE-2025-50181", "description": "A flaw was found in urllib3. The `PoolManager` class allows redirects to be disabled by configuring retries in a specific manner, effectively bypassing intended HTTP redirection behavior. A network attacker can leverage this configuration to manipulate request flows and disrupt service. This bypass occurs through improper handling of retry parameters during PoolManager instantiation. This issue can reult in a denial of service or unintended data exposure due to altered request destinations.", "issued": "2025-06-19T01:08:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-50181 https://bugzilla.redhat.com/show_bug.cgi?id=2373799 https://www.cve.org/CVERecord?id=CVE-2025-50181 https://nvd.nist.gov/vuln/detail/CVE-2025-50181 https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857 https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-50181.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "python-pip", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "EjPl60c/5Xt+2Awh7Lu5jw==": { "id": "EjPl60c/5Xt+2Awh7Lu5jw==", "updater": "rhel-vex", "name": "CVE-2025-7546", "description": "A flaw was found in gnu-binutils. The `bfd_elf_set_group_contents` function in `bfd/elf.c` contains an out-of-bounds write vulnerability triggered by manipulation of the ELF file contents. This flaw allows a local attacker to provide a crafted file. This manipulation can lead to memory corruption.", "issued": "2025-07-13T22:02:07Z", "links": "https://access.redhat.com/security/cve/CVE-2025-7546 https://bugzilla.redhat.com/show_bug.cgi?id=2379793 https://www.cve.org/CVERecord?id=CVE-2025-7546 https://nvd.nist.gov/vuln/detail/CVE-2025-7546 https://sourceware.org/bugzilla/attachment.cgi?id=16118 https://sourceware.org/bugzilla/show_bug.cgi?id=33050 https://sourceware.org/bugzilla/show_bug.cgi?id=33050#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=41461010eb7c79fee7a9d5f6209accdaac66cc6b https://vuldb.com/?ctiid.316244 https://vuldb.com/?id.316244 https://vuldb.com/?submit.614375 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7546.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "F/boCR7kXAGa4+GAELD7Tg==": { "id": "F/boCR7kXAGa4+GAELD7Tg==", "updater": "rhel-vex", "name": "CVE-2025-11413", "description": "A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds write in the bfd_putl64 function in the bfd/libbfd.c file due to an improper check, causing a crash and resulting in a denial of service.", "issued": "2025-10-07T22:02:12Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11413 https://bugzilla.redhat.com/show_bug.cgi?id=2402423 https://www.cve.org/CVERecord?id=CVE-2025-11413 https://nvd.nist.gov/vuln/detail/CVE-2025-11413 https://sourceware.org/bugzilla/show_bug.cgi?id=33456 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=72efdf166aa0ed72ecc69fc2349af6591a7a19c0 https://vuldb.com/?id.327349 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11413.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "FAgeMhGaGcH9QOhQHw5rhQ==": { "id": "FAgeMhGaGcH9QOhQHw5rhQ==", "updater": "rhel-vex", "name": "CVE-2024-13978", "description": "A flaw was found in libtiff. The `t2p_read_tiff_init` function in the fax2ps component incorrectly handles TIFF files, leading to a null pointer dereference. A local attacker can trigger this condition by providing a specially crafted TIFF file. This can result in an application level denial of service.", "issued": "2025-08-01T21:32:07Z", "links": "https://access.redhat.com/security/cve/CVE-2024-13978 https://bugzilla.redhat.com/show_bug.cgi?id=2386059 https://www.cve.org/CVERecord?id=CVE-2024-13978 https://nvd.nist.gov/vuln/detail/CVE-2024-13978 http://www.libtiff.org/ https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4 https://gitlab.com/libtiff/libtiff/-/issues/649 https://gitlab.com/libtiff/libtiff/-/merge_requests/667 https://vuldb.com/?ctiid.318355 https://vuldb.com/?id.318355 https://vuldb.com/?submit.624562 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-13978.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "FE/mnRiATGHgivPxG+13dw==": { "id": "FE/mnRiATGHgivPxG+13dw==", "updater": "rhel-vex", "name": "CVE-2025-6170", "description": "A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.", "issued": "2025-06-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-6170 https://bugzilla.redhat.com/show_bug.cgi?id=2372952 https://www.cve.org/CVERecord?id=CVE-2025-6170 https://nvd.nist.gov/vuln/detail/CVE-2025-6170 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6170.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libxml2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "FpA1FaTnKUwdPkl0KHAbaw==": { "id": "FpA1FaTnKUwdPkl0KHAbaw==", "updater": "rhel-vex", "name": "CVE-2025-11412", "description": "A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds read in the bfd_elf_gc_record_vtentry function in the bfd/elflink.c file due to a missing sanity check, causing a crash and resulting in a denial of service.", "issued": "2025-10-07T22:02:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11412 https://bugzilla.redhat.com/show_bug.cgi?id=2402425 https://www.cve.org/CVERecord?id=CVE-2025-11412 https://nvd.nist.gov/vuln/detail/CVE-2025-11412 https://sourceware.org/bugzilla/show_bug.cgi?id=33452 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc https://vuldb.com/?id.327348 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11412.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "G1biuc7MPjr1XA/l1R5EPQ==": { "id": "G1biuc7MPjr1XA/l1R5EPQ==", "updater": "rhel-vex", "name": "CVE-2025-10966", "description": "curl's code for managing SSH connections when SFTP was done using the wolfSSH\npowered backend was flawed and missed host verification mechanisms.\n\nThis prevents curl from detecting MITM attackers and more.", "issued": "2025-11-07T07:26:30Z", "links": "https://access.redhat.com/security/cve/CVE-2025-10966 https://bugzilla.redhat.com/show_bug.cgi?id=2413308 https://www.cve.org/CVERecord?id=CVE-2025-10966 https://nvd.nist.gov/vuln/detail/CVE-2025-10966 http://www.openwall.com/lists/oss-security/2025/11/05/2 https://curl.se/docs/CVE-2025-10966.html https://curl.se/docs/CVE-2025-10966.json https://github.com/curl/curl/commit/b011e3fcfb06d6c027859 https://hackerone.com/reports/3355218 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-10966.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "curl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "GAn7gWUe2pFr7PbwechqxA==": { "id": "GAn7gWUe2pFr7PbwechqxA==", "updater": "rhel-vex", "name": "CVE-2025-30258", "description": "A flaw was found in GnuPG. In affected versions, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, leading to a verification denial of service.", "issued": "2025-03-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-30258 https://bugzilla.redhat.com/show_bug.cgi?id=2353427 https://www.cve.org/CVERecord?id=CVE-2025-30258 https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-30258.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gnupg2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "GW37uYQxwwgJBIDtA/dT2g==": { "id": "GW37uYQxwwgJBIDtA/dT2g==", "updater": "rhel-vex", "name": "CVE-2025-1795", "description": "A flaw was found in Python. When a separating comma ends up on a folded line during an address list folding of email headers, the comma is unintentionally unicode encoded. The expected behavior is that the separating comma remains unencoded. This can result in the address header being misinterpreted by some mail servers.", "issued": "2025-02-28T18:59:31Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1795 https://bugzilla.redhat.com/show_bug.cgi?id=2349061 https://www.cve.org/CVERecord?id=CVE-2025-1795 https://nvd.nist.gov/vuln/detail/CVE-2025-1795 https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48 https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593 https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74 https://github.com/python/cpython/issues/100884 https://github.com/python/cpython/pull/100885 https://github.com/python/cpython/pull/119099 https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1795.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "normalized_severity": "Low", "package": { "id": "", "name": "python3.9", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "GXMpRf2go/wGEbwpp9BPPQ==": { "id": "GXMpRf2go/wGEbwpp9BPPQ==", "updater": "rhel-vex", "name": "CVE-2023-1175", "description": "A flaw was found in Vim. There is an incorrect calculation of buffer size issue found in Vim's yank_copy_line() function of the register.c file. This flaw allows illegal memory access when using virtual editing as \"startspaces\" goes negative. An attacker can trick a user into opening a specially crafted file, triggering an issue that causes an application to crash leading to a denial of service, corrupting memory, and possibly executing code.", "issued": "2023-03-04T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-1175 https://bugzilla.redhat.com/show_bug.cgi?id=2176457 https://www.cve.org/CVERecord?id=CVE-2023-1175 https://nvd.nist.gov/vuln/detail/CVE-2023-1175 https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1175.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "GfPY5zBbHJQI4ZGaDcJj2A==": { "id": "GfPY5zBbHJQI4ZGaDcJj2A==", "updater": "rhel-vex", "name": "CVE-2022-3278", "description": "A NULL pointer dereference vulnerability was found in Vim's eval_next_non_blank() function of the src/eval.c file. The flaw occurs when using NUL in buffer uses :source. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL pointer dereference that causes a denial of service.", "issued": "2022-09-24T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3278 https://bugzilla.redhat.com/show_bug.cgi?id=2129831 https://www.cve.org/CVERecord?id=CVE-2022-3278 https://nvd.nist.gov/vuln/detail/CVE-2022-3278 https://huntr.dev/bounties/a9fad77e-f245-4ce9-ba15-c7d4c86c4612 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3278.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "GnBCRP9H+R6do428z3nOkQ==": { "id": "GnBCRP9H+R6do428z3nOkQ==", "updater": "rhel-vex", "name": "CVE-2021-4173", "description": "A flaw was found in vim. A possible use after free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution.", "issued": "2021-12-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-4173 https://bugzilla.redhat.com/show_bug.cgi?id=2035930 https://www.cve.org/CVERecord?id=CVE-2021-4173 https://nvd.nist.gov/vuln/detail/CVE-2021-4173 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4173.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "GuM8+Ku1VtBzfPk3/FCgzw==": { "id": "GuM8+Ku1VtBzfPk3/FCgzw==", "updater": "rhel-vex", "name": "CVE-2022-1056", "description": "Out-of-bounds Read error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 46dc8fcd.", "issued": "2022-03-01T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-1056 https://bugzilla.redhat.com/show_bug.cgi?id=2233599 https://www.cve.org/CVERecord?id=CVE-2022-1056 https://nvd.nist.gov/vuln/detail/CVE-2022-1056 https://security.gentoo.org/glsa/202210-10 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1056.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "HHBOKYlzeD2Busv7btyBAA==": { "id": "HHBOKYlzeD2Busv7btyBAA==", "updater": "rhel-vex", "name": "CVE-2023-48232", "description": "A flaw was found in Vim, an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines when smooth scrolling is enabled and the cpo-settings include the 'n' flag. This issue may occur when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Only users with non-default settings are affected and the exception should only result in a crash.", "issued": "2023-11-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-48232 https://bugzilla.redhat.com/show_bug.cgi?id=2250269 https://www.cve.org/CVERecord?id=CVE-2023-48232 https://nvd.nist.gov/vuln/detail/CVE-2023-48232 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/cb0b99f0672d8446585d26e998343dceca17d1ce https://github.com/vim/vim/security/advisories/GHSA-f6cx-x634-hqpw https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48232.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "HlOu0EmTxHkjzmJeJEuJmw==": { "id": "HlOu0EmTxHkjzmJeJEuJmw==", "updater": "rhel-vex", "name": "CVE-2023-4735", "description": "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.", "issued": "2023-09-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-4735 https://bugzilla.redhat.com/show_bug.cgi?id=2237165 https://www.cve.org/CVERecord?id=CVE-2023-4735 https://nvd.nist.gov/vuln/detail/CVE-2023-4735 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4735.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "HxI42iSjURjRki+uV6q/9w==": { "id": "HxI42iSjURjRki+uV6q/9w==", "updater": "rhel-vex", "name": "CVE-2024-0232", "description": "A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.", "issued": "2023-10-12T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-0232 https://bugzilla.redhat.com/show_bug.cgi?id=2243754 https://www.cve.org/CVERecord?id=CVE-2024-0232 https://nvd.nist.gov/vuln/detail/CVE-2024-0232 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-0232.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "sqlite", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "I3+uP7bb+nPtzRYHH2UUgw==": { "id": "I3+uP7bb+nPtzRYHH2UUgw==", "updater": "rhel-vex", "name": "CVE-2021-3826", "description": "A vulnerability was found in Libiberty. A heap and stack buffer overflow found in the dlang_lname function in d-demangle.c leads to a denial of service.", "issued": "2021-09-22T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-3826 https://bugzilla.redhat.com/show_bug.cgi?id=2122627 https://www.cve.org/CVERecord?id=CVE-2021-3826 https://nvd.nist.gov/vuln/detail/CVE-2021-3826 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3826.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "I3vwwgMxzxWo15otCOgvAw==": { "id": "I3vwwgMxzxWo15otCOgvAw==", "updater": "rhel-vex", "name": "CVE-2021-3928", "description": "A flaw was found in vim. A possible stack-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "issued": "2021-10-29T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-3928 https://bugzilla.redhat.com/show_bug.cgi?id=2021292 https://www.cve.org/CVERecord?id=CVE-2021-3928 https://nvd.nist.gov/vuln/detail/CVE-2021-3928 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3928.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "IeTK1HBLKpS1+gfVSPrpvg==": { "id": "IeTK1HBLKpS1+gfVSPrpvg==", "updater": "rhel-vex", "name": "CVE-2022-47007", "description": "A memory leak was found in function stab_demangle_v3_arg in stabs.c in Binutils, allows local attacker to exploit the vulnerability using specially crafted file to cause Denial of Service.", "issued": "2022-06-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-47007 https://bugzilla.redhat.com/show_bug.cgi?id=2233980 https://www.cve.org/CVERecord?id=CVE-2022-47007 https://nvd.nist.gov/vuln/detail/CVE-2022-47007 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47007.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "IfJyKZ52fwKruf/mbOKmYg==": { "id": "IfJyKZ52fwKruf/mbOKmYg==", "updater": "rhel-vex", "name": "CVE-2024-57360", "description": "A flaw was found in the nm utility of binutils. A local user who specifies the `--without-symbol-versions` option on a specially crafted ELF file can trigger a segmentation fault condition. This may lead to an application crash or other undefined behavior.", "issued": "2025-01-21T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-57360 https://bugzilla.redhat.com/show_bug.cgi?id=2339263 https://www.cve.org/CVERecord?id=CVE-2024-57360 https://nvd.nist.gov/vuln/detail/CVE-2024-57360 https://sourceware.org/bugzilla/show_bug.cgi?id=32467 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-57360.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Ihq7mkhGM9sf/8QM05o7gw==": { "id": "Ihq7mkhGM9sf/8QM05o7gw==", "updater": "rhel-vex", "name": "CVE-2023-6277", "description": "An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB.", "issued": "2023-11-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-6277 https://bugzilla.redhat.com/show_bug.cgi?id=2251311 https://www.cve.org/CVERecord?id=CVE-2023-6277 https://nvd.nist.gov/vuln/detail/CVE-2023-6277 https://gitlab.com/libtiff/libtiff/-/issues/614 https://gitlab.com/libtiff/libtiff/-/merge_requests/545 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-6277.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "IvL651FnAzrxSYOiOuXMlw==": { "id": "IvL651FnAzrxSYOiOuXMlw==", "updater": "rhel-vex", "name": "CVE-2022-47010", "description": "A memory leak flaw was found in binutils in the pr_function_type function. This flaw allows an attacker to use a set of steps to trigger a memory leak and perform a denial of service, resulting in a loss of the system's availability.", "issued": "2022-06-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-47010 https://bugzilla.redhat.com/show_bug.cgi?id=2233988 https://www.cve.org/CVERecord?id=CVE-2022-47010 https://nvd.nist.gov/vuln/detail/CVE-2022-47010 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47010.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "JD0llI0bGUOG/VBz+9LeVQ==": { "id": "JD0llI0bGUOG/VBz+9LeVQ==", "updater": "rhel-vex", "name": "CVE-2023-48235", "description": "A flaw as found in Vim, an open source command line text editor. When parsing relative ex addresses, one may unintentionally cause an overflow. Ironically, this happens in the existing overflow check because the line number becomes negative and LONG_MAX - lnum will cause the overflow. The impact is low because user interaction is required and a crash may not happen in all situations.", "issued": "2023-11-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-48235 https://bugzilla.redhat.com/show_bug.cgi?id=2250272 https://www.cve.org/CVERecord?id=CVE-2023-48235 https://nvd.nist.gov/vuln/detail/CVE-2023-48235 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200 https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48235.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Jl0PQIP9L3ufSvQ2j71iww==": { "id": "Jl0PQIP9L3ufSvQ2j71iww==", "updater": "osv/pypi", "name": "GHSA-r9hx-vwmv-q579", "description": "pypa/setuptools vulnerable to Regular Expression Denial of Service (ReDoS)", "issued": "2022-12-23T00:30:23Z", "links": "https://nvd.nist.gov/vuln/detail/CVE-2022-40897 https://github.com/pypa/setuptools/issues/3659 https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be https://setuptools.pypa.io/en/latest https://security.netapp.com/advisory/ntap-20240621-0006 https://security.netapp.com/advisory/ntap-20230214-0001 https://pyup.io/vulnerabilities/CVE-2022-40897/52495 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1 https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200 https://github.com/pypa/setuptools https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2022-43012.yaml", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "High", "package": { "id": "", "name": "setuptools", "version": "", "kind": "binary", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "pypi", "uri": "https://pypi.org/", "cpe": "" }, "fixed_in_version": "fixed=65.5.1" }, "JmKf//IQj2eMVJFTB1Feyw==": { "id": "JmKf//IQj2eMVJFTB1Feyw==", "updater": "rhel-vex", "name": "CVE-2023-48234", "description": "A flaw was found in Vim, an open source command line text editor. When getting the count for a normal mode z command, it may overflow if large counts are given. The impact is low because user interaction is required and a crash may not happen in all situations.", "issued": "2023-11-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-48234 https://bugzilla.redhat.com/show_bug.cgi?id=2250271 https://www.cve.org/CVERecord?id=CVE-2023-48234 https://nvd.nist.gov/vuln/detail/CVE-2023-48234 http://www.openwall.com/lists/oss-security/2023/11/16/1 https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48234.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "JtGggrfMckWn0xvfWBMJJQ==": { "id": "JtGggrfMckWn0xvfWBMJJQ==", "updater": "rhel-vex", "name": "CVE-2022-2210", "description": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", "issued": "2022-06-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2210 https://bugzilla.redhat.com/show_bug.cgi?id=2102177 https://www.cve.org/CVERecord?id=CVE-2022-2210 https://nvd.nist.gov/vuln/detail/CVE-2022-2210 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2210.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "KC4H6WRPkYrWvXb9OC+odg==": { "id": "KC4H6WRPkYrWvXb9OC+odg==", "updater": "rhel-vex", "name": "CVE-2023-3164", "description": "A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.", "issued": "2023-04-03T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-3164 https://bugzilla.redhat.com/show_bug.cgi?id=2213531 https://www.cve.org/CVERecord?id=CVE-2023-3164 https://nvd.nist.gov/vuln/detail/CVE-2023-3164 https://gitlab.com/libtiff/libtiff/-/issues/542 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-3164.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "KYv6PwzjV6/5I33cZ9LUmQ==": { "id": "KYv6PwzjV6/5I33cZ9LUmQ==", "updater": "rhel-vex", "name": "CVE-2022-2817", "description": "A use-after-free vulnerability was found in Vim in the string_quote function in the strings.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.", "issued": "2022-08-12T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2817 https://bugzilla.redhat.com/show_bug.cgi?id=2119043 https://www.cve.org/CVERecord?id=CVE-2022-2817 https://nvd.nist.gov/vuln/detail/CVE-2022-2817 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2817.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Kqq2xlybjD/tOLmQWu2xPw==": { "id": "Kqq2xlybjD/tOLmQWu2xPw==", "updater": "rhel-vex", "name": "CVE-2025-5918", "description": "A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.", "issued": "2025-05-20T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5918 https://bugzilla.redhat.com/show_bug.cgi?id=2370877 https://www.cve.org/CVERecord?id=CVE-2025-5918 https://nvd.nist.gov/vuln/detail/CVE-2025-5918 https://github.com/libarchive/libarchive/pull/2584 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5918.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "KsboTEAsiwsdLEKIDivkyA==": { "id": "KsboTEAsiwsdLEKIDivkyA==", "updater": "rhel-vex", "name": "CVE-2022-2175", "description": "A heap buffer over-read vulnerability was found in Vim's put_on_cmdline() function of the src/ex_getln.c file. This issue occurs due to invalid memory access when using an expression on the command line. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap buffer overflow that causes an application to crash and corrupt memory.", "issued": "2022-06-23T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2175 https://bugzilla.redhat.com/show_bug.cgi?id=2101293 https://www.cve.org/CVERecord?id=CVE-2022-2175 https://nvd.nist.gov/vuln/detail/CVE-2022-2175 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2175.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "LkJjju2s50oKpBRyBT8s0A==": { "id": "LkJjju2s50oKpBRyBT8s0A==", "updater": "rhel-vex", "name": "CVE-2024-41965", "description": "A vulnerability was found in Vim versions before 9.1.0648 that can cause the program to crash. This issue happens when a user abandons a modified file, and Vim tries to save it as an Untitled file. Due to a mistake in handling this process, Vim accidentally tries to free up memory twice, which can lead to problems, causing the program to crash. This issue can be exploited by someone with local access to the system.", "issued": "2024-08-01T22:21:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-41965 https://bugzilla.redhat.com/show_bug.cgi?id=2302419 https://www.cve.org/CVERecord?id=CVE-2024-41965 https://nvd.nist.gov/vuln/detail/CVE-2024-41965 https://github.com/vim/vim/commit/b29f4abcd4b3382fa746edd1d0562b7b48c https://github.com/vim/vim/security/advisories/GHSA-46pw-v7qw-xc2f https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41965.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "LyQcB6aDtcDf3FmzBVHSKQ==": { "id": "LyQcB6aDtcDf3FmzBVHSKQ==", "updater": "rhel-vex", "name": "CVE-2025-1150", "description": "A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.", "issued": "2025-02-10T16:31:07Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1150 https://bugzilla.redhat.com/show_bug.cgi?id=2344681 https://www.cve.org/CVERecord?id=CVE-2025-1150 https://nvd.nist.gov/vuln/detail/CVE-2025-1150 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295054 https://vuldb.com/?id.295054 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1150.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "MLyBE3p9/9+LMOMl2JBi6w==": { "id": "MLyBE3p9/9+LMOMl2JBi6w==", "updater": "rhel-vex", "name": "CVE-2022-2343", "description": "A heap-based buffer overflow was found in Vim in the ins_compl_add function in the insexpand.c file. This issue occurs due to a read past the end of a buffer when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash, possibly executing code and corrupting memory.", "issued": "2022-07-06T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2343 https://bugzilla.redhat.com/show_bug.cgi?id=2106779 https://www.cve.org/CVERecord?id=CVE-2022-2343 https://nvd.nist.gov/vuln/detail/CVE-2022-2343 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2343.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "MMLwOzBcCET4jaa3dPuTwQ==": { "id": "MMLwOzBcCET4jaa3dPuTwQ==", "updater": "rhel-vex", "name": "CVE-2022-38533", "description": "A vulnerability was found in the strip utility of binutils. An attacker able to convince a victim to process a specially crafted COFF file by the strip utility can lead to a heap-based buffer overflow, causing the utility to crash.", "issued": "2022-08-13T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-38533 https://bugzilla.redhat.com/show_bug.cgi?id=2124569 https://www.cve.org/CVERecord?id=CVE-2022-38533 https://nvd.nist.gov/vuln/detail/CVE-2022-38533 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-38533.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Mo/R2a7u4vWlPy8O1jH7HQ==": { "id": "Mo/R2a7u4vWlPy8O1jH7HQ==", "updater": "rhel-vex", "name": "CVE-2024-8244", "description": "The filepath.Walk and filepath.WalkDir functions are documented as not following symbolic links, but both functions are susceptible to a TOCTOU (time of check/time of use) race condition where a portion of the path being walked is replaced with a symbolic link while the walk is in progress.", "issued": "2025-08-06T15:32:27Z", "links": "https://access.redhat.com/security/cve/CVE-2024-8244 https://bugzilla.redhat.com/show_bug.cgi?id=2386885 https://www.cve.org/CVERecord?id=CVE-2024-8244 https://nvd.nist.gov/vuln/detail/CVE-2024-8244 https://go.dev/issue/70007 https://pkg.go.dev/vuln/GO-2025-9999 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-8244.json", "severity": "CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "go-rpm-macros", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Mqs34KD77Q9uZxNX/8mz0Q==": { "id": "Mqs34KD77Q9uZxNX/8mz0Q==", "updater": "rhel-vex", "name": "CVE-2025-11494", "description": "A vulnerability was found in GNU Binutils 2.45. Impacted is the function _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is identified as b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a. A patch should be applied to remediate this issue.", "issued": "2025-10-08T19:32:07Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11494 https://bugzilla.redhat.com/show_bug.cgi?id=2402559 https://www.cve.org/CVERecord?id=CVE-2025-11494 https://nvd.nist.gov/vuln/detail/CVE-2025-11494 https://sourceware.org/bugzilla/attachment.cgi?id=16389 https://sourceware.org/bugzilla/show_bug.cgi?id=33499 https://sourceware.org/bugzilla/show_bug.cgi?id=33499#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a https://vuldb.com/?ctiid.327619 https://vuldb.com/?id.327619 https://vuldb.com/?submit.668281 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11494.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "NeZAaBfGrzLvaMKrJL7WlA==": { "id": "NeZAaBfGrzLvaMKrJL7WlA==", "updater": "rhel-vex", "name": "CVE-2024-45306", "description": "A heap-buffer overflow was found in Vim. Patch v9.1.0038 optimized how the cursor position is calculated and removed a loop, that verified that the cursor position always points inside a line and does not become invalid by pointing beyond the end of a line. It was assumed that this loop was unnecessary. However, this change made it possible for the cursor position to stay invalid and point beyond the end of a line, which would eventually cause a heap-buffer-overflow when trying to access the line pointer at the specified cursor position.", "issued": "2024-09-02T18:15:36Z", "links": "https://access.redhat.com/security/cve/CVE-2024-45306 https://bugzilla.redhat.com/show_bug.cgi?id=2309275 https://www.cve.org/CVERecord?id=CVE-2024-45306 https://nvd.nist.gov/vuln/detail/CVE-2024-45306 https://github.com/vim/vim/commit/396fd1ec2956307755392a1 https://github.com/vim/vim/releases/tag/v9.1.0038 https://github.com/vim/vim/security/advisories/GHSA-wxf9-c5gx-qrwr https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-45306.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "OXr+UvfSDAQbLGP4xOBSMw==": { "id": "OXr+UvfSDAQbLGP4xOBSMw==", "updater": "rhel-vex", "name": "CVE-2023-1127", "description": "A flaw was found in Vim. A division by zero in the scrolldown function may lead to a denial of service, modified memory, and possibly remote execution.", "issued": "2023-03-01T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-1127 https://bugzilla.redhat.com/show_bug.cgi?id=2174662 https://www.cve.org/CVERecord?id=CVE-2023-1127 https://nvd.nist.gov/vuln/detail/CVE-2023-1127 https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1127.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Ob+LJ5zYHnbjt14Yf8W7UA==": { "id": "Ob+LJ5zYHnbjt14Yf8W7UA==", "updater": "rhel-vex", "name": "CVE-2022-3016", "description": "A heap use-after-free vulnerability was found in vim's get_next_valid_entry() function of the src/quickfix.c file. The issue occurs because vim is using freed memory when the location list is changed in autocmd. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-08-28T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3016 https://bugzilla.redhat.com/show_bug.cgi?id=2124208 https://www.cve.org/CVERecord?id=CVE-2022-3016 https://nvd.nist.gov/vuln/detail/CVE-2022-3016 https://huntr.dev/bounties/260516c2-5c4a-4b7f-a01c-04b1aeeea371 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3016.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Pj9V3uC2c9o+P6lTpzzGeA==": { "id": "Pj9V3uC2c9o+P6lTpzzGeA==", "updater": "osv/pypi", "name": "PYSEC-2025-49", "description": "", "issued": "2025-05-17T16:15:19Z", "links": "https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88", "severity": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "normalized_severity": "High", "package": { "id": "", "name": "setuptools", "version": "", "kind": "binary", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "pypi", "uri": "https://pypi.org/", "cpe": "" }, "fixed_in_version": "fixed=78.1.1" }, "Pza9Y2xtH9MChVMkZwgw2A==": { "id": "Pza9Y2xtH9MChVMkZwgw2A==", "updater": "rhel-vex", "name": "CVE-2024-7264", "description": "A flaw was found in libcurl, where libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.", "issued": "2024-07-31T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-7264 https://bugzilla.redhat.com/show_bug.cgi?id=2301888 https://www.cve.org/CVERecord?id=CVE-2024-7264 https://nvd.nist.gov/vuln/detail/CVE-2024-7264 https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-7264.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "curl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Q0D37bmhhLGtYILIAMgFXg==": { "id": "Q0D37bmhhLGtYILIAMgFXg==", "updater": "rhel-vex", "name": "CVE-2022-2207", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", "issued": "2022-06-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2207 https://bugzilla.redhat.com/show_bug.cgi?id=2102185 https://www.cve.org/CVERecord?id=CVE-2022-2207 https://nvd.nist.gov/vuln/detail/CVE-2022-2207 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2207.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Q1F3DVZZ3gpMNQT3yhbiSg==": { "id": "Q1F3DVZZ3gpMNQT3yhbiSg==", "updater": "rhel-vex", "name": "CVE-2025-10911", "description": "A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.", "issued": "2025-08-04T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-10911 https://bugzilla.redhat.com/show_bug.cgi?id=2397838 https://www.cve.org/CVERecord?id=CVE-2025-10911 https://nvd.nist.gov/vuln/detail/CVE-2025-10911 https://gitlab.gnome.org/GNOME/libxslt/-/issues/144 https://gitlab.gnome.org/GNOME/libxslt/-/merge_requests/77 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-10911.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libxslt", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "QGq5D5QwQKPerzYOBVoSsg==": { "id": "QGq5D5QwQKPerzYOBVoSsg==", "updater": "osv/pypi", "name": "GHSA-cx63-2mw6-8hw5", "description": "setuptools vulnerable to Command Injection via package URL", "issued": "2024-07-15T03:30:57Z", "links": "https://nvd.nist.gov/vuln/detail/CVE-2024-6345 https://github.com/pypa/setuptools/pull/4332 https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0 https://github.com/pypa/setuptools https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5 https://lists.debian.org/debian-lts-announce/2024/09/msg00018.html", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "High", "package": { "id": "", "name": "setuptools", "version": "", "kind": "binary", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "pypi", "uri": "https://pypi.org/", "cpe": "" }, "fixed_in_version": "fixed=70.0.0" }, "QX9gQ7esz1e73iQHmwojXA==": { "id": "QX9gQ7esz1e73iQHmwojXA==", "updater": "rhel-vex", "name": "CVE-2021-3973", "description": "A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability.", "issued": "2021-11-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-3973 https://bugzilla.redhat.com/show_bug.cgi?id=2025059 https://www.cve.org/CVERecord?id=CVE-2021-3973 https://nvd.nist.gov/vuln/detail/CVE-2021-3973 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3973.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "QbgvVzhz2dr5BDvAUM6wFQ==": { "id": "QbgvVzhz2dr5BDvAUM6wFQ==", "updater": "rhel-vex", "name": "CVE-2022-2304", "description": "A stack-based buffer overflow vulnerability was found in Vim's spell_dump_compl() function of the src/spell.c file. This issue occurs because the spell dump goes beyond the end of an array when crafted input is processed. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-07-05T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2304 https://bugzilla.redhat.com/show_bug.cgi?id=2104416 https://www.cve.org/CVERecord?id=CVE-2022-2304 https://nvd.nist.gov/vuln/detail/CVE-2022-2304 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2304.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Qd2XnJZ3qaQ3AbyDXUaR2A==": { "id": "Qd2XnJZ3qaQ3AbyDXUaR2A==", "updater": "osv/pypi", "name": "PYSEC-2022-43012", "description": "", "issued": "2022-12-23T00:15:00Z", "links": "https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200 https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1 https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be https://pyup.io/vulnerabilities/CVE-2022-40897/52495/", "severity": "", "normalized_severity": "Unknown", "package": { "id": "", "name": "setuptools", "version": "", "kind": "binary", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "pypi", "uri": "https://pypi.org/", "cpe": "" }, "fixed_in_version": "fixed=65.5.1" }, "Qe1reyLPtQVZ5wKqKa9jQA==": { "id": "Qe1reyLPtQVZ5wKqKa9jQA==", "updater": "rhel-vex", "name": "CVE-2022-0213", "description": "A flaw was found in vim. The vulnerability occurs due to not checking the length for the NameBuff function, which can lead to a heap buffer overflow. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", "issued": "2022-01-12T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-0213 https://bugzilla.redhat.com/show_bug.cgi?id=2043779 https://www.cve.org/CVERecord?id=CVE-2022-0213 https://nvd.nist.gov/vuln/detail/CVE-2022-0213 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-0213.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "QgRg8usqYLpC2SzTmhUKsQ==": { "id": "QgRg8usqYLpC2SzTmhUKsQ==", "updater": "rhel-vex", "name": "CVE-2025-22134", "description": "A flaw was found in Vim. Due to Vim not properly terminating visual mode, a heap buffer overflow condition may be triggered when a user switches buffers using the `:all` command. This issue may lead to unexpected behavior, such as an application crash or memory corruption.", "issued": "2025-01-13T20:41:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-22134 https://bugzilla.redhat.com/show_bug.cgi?id=2337437 https://www.cve.org/CVERecord?id=CVE-2025-22134 https://nvd.nist.gov/vuln/detail/CVE-2025-22134 https://github.com/vim/vim/commit/c9a1e257f1630a0866447e53a564f7ff96a80ead https://github.com/vim/vim/security/advisories/GHSA-5rgf-26wj-48v8 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-22134.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "R1x4adkbkgVhxc9hzgUZcA==": { "id": "R1x4adkbkgVhxc9hzgUZcA==", "updater": "rhel-vex", "name": "CVE-2024-25260", "description": "A NULL pointer dereference vulnerability in the elfutils library has been discovered. This vulnerability occurs within the handle_verdef() function in the readelf.c source file. A NULL pointer dereference typically happens when a program attempts to access memory using a pointer that is not pointing anywhere (i.e., it's NULL), leading to a crash or potentially exploitable behavior.", "issued": "2024-02-20T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-25260 https://bugzilla.redhat.com/show_bug.cgi?id=2265194 https://www.cve.org/CVERecord?id=CVE-2024-25260 https://nvd.nist.gov/vuln/detail/CVE-2024-25260 https://github.com/schsiung/fuzzer_issues/issues/1 https://sourceware.org/bugzilla/show_bug.cgi?id=31058 https://sourceware.org/elfutils/ https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-25260.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "elfutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "RATpPhLUqjEbe+XxyYxOOw==": { "id": "RATpPhLUqjEbe+XxyYxOOw==", "updater": "rhel-vex", "name": "CVE-2022-2257", "description": "A flaw was found in vim, which is vulnerable to an out-of-bounds read in the msg_outtrans_special function. This flaw allows a specially crafted file to crash software or execute code when opened in vim.", "issued": "2022-06-30T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2257 https://bugzilla.redhat.com/show_bug.cgi?id=2103133 https://www.cve.org/CVERecord?id=CVE-2022-2257 https://nvd.nist.gov/vuln/detail/CVE-2022-2257 https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2257.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "RPWIFXazUxYQ5Q1rBYTqdg==": { "id": "RPWIFXazUxYQ5Q1rBYTqdg==", "updater": "rhel-vex", "name": "CVE-2025-61985", "description": "ssh in OpenSSH before 10.1 allows the '\\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.", "issued": "2025-10-06T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-61985 https://bugzilla.redhat.com/show_bug.cgi?id=2401962 https://www.cve.org/CVERecord?id=CVE-2025-61985 https://nvd.nist.gov/vuln/detail/CVE-2025-61985 https://marc.info/?l=openssh-unix-dev\u0026m=175974522032149\u0026w=2 https://www.openssh.com/releasenotes.html#10.1p1 https://www.openwall.com/lists/oss-security/2025/10/06/1 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-61985.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "openssh", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Rd2hVVbUws+mcvoC7DaoiQ==": { "id": "Rd2hVVbUws+mcvoC7DaoiQ==", "updater": "rhel-vex", "name": "CVE-2022-4292", "description": "A heap use-after-free flaw was found in Vim's did_set_spelllang() function of the spell.c file. This issue occurs because vim uses freed memory after SpellFileMissing autocmd uses bwipe. This could allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free issue that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-12-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-4292 https://bugzilla.redhat.com/show_bug.cgi?id=2151558 https://www.cve.org/CVERecord?id=CVE-2022-4292 https://nvd.nist.gov/vuln/detail/CVE-2022-4292 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4292.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "RdY/UQx2FGTtVn1x7G1KkA==": { "id": "RdY/UQx2FGTtVn1x7G1KkA==", "updater": "rhel-vex", "name": "CVE-2025-52099", "description": "Integer Overflow vulnerability in SQLite SQLite3 v.3.50.0 allows a remote attacker to cause a denial of service via the setupLookaside function", "issued": "2025-10-24T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-52099 https://bugzilla.redhat.com/show_bug.cgi?id=2406257 https://www.cve.org/CVERecord?id=CVE-2025-52099 https://nvd.nist.gov/vuln/detail/CVE-2025-52099 http://sqlite3.com https://github.com/SCREAMBBY/CVE-2025-52099 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-52099.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "sqlite", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "RoQvxPrgcpXyTej834bT2Q==": { "id": "RoQvxPrgcpXyTej834bT2Q==", "updater": "rhel-vex", "name": "CVE-2024-57360", "description": "A flaw was found in the nm utility of binutils. A local user who specifies the `--without-symbol-versions` option on a specially crafted ELF file can trigger a segmentation fault condition. This may lead to an application crash or other undefined behavior.", "issued": "2025-01-21T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-57360 https://bugzilla.redhat.com/show_bug.cgi?id=2339263 https://www.cve.org/CVERecord?id=CVE-2024-57360 https://nvd.nist.gov/vuln/detail/CVE-2024-57360 https://sourceware.org/bugzilla/show_bug.cgi?id=32467 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-57360.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Rs2w9Uui+dW2Lg48Ml6jpw==": { "id": "Rs2w9Uui+dW2Lg48Ml6jpw==", "updater": "rhel-vex", "name": "CVE-2025-1632", "description": "A flaw was found in the bsdunzip utility of libarchive. In affected versions, a specially crafted file may trigger a null pointer dereference. This issue can lead to an application crash or other unexpected behavior.", "issued": "2025-02-24T13:31:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1632 https://bugzilla.redhat.com/show_bug.cgi?id=2347309 https://www.cve.org/CVERecord?id=CVE-2025-1632 https://nvd.nist.gov/vuln/detail/CVE-2025-1632 https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc https://vuldb.com/?ctiid.296619 https://vuldb.com/?id.296619 https://vuldb.com/?submit.496460 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1632.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "RxiYxX3H5lL8cc7k0ac/mQ==": { "id": "RxiYxX3H5lL8cc7k0ac/mQ==", "updater": "rhel-vex", "name": "CVE-2025-4516", "description": "A vulnerability has been identified in CPython's bytes.decode() function when used with the \"unicode_escape\" encoding and the \"ignore\" or \"replace\" error handling modes. This flaw can result in the incorrect decoding of byte strings. While this may not directly lead to traditional security breaches like data exfiltration, the resulting unexpected program behavior could introduce instability, logic errors, or unintended side effects within applications that rely on this specific decoding functionality.", "issued": "2025-05-15T13:29:20Z", "links": "https://access.redhat.com/security/cve/CVE-2025-4516 https://bugzilla.redhat.com/show_bug.cgi?id=2366509 https://www.cve.org/CVERecord?id=CVE-2025-4516 https://nvd.nist.gov/vuln/detail/CVE-2025-4516 https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142 https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e https://github.com/python/cpython/issues/133767 https://github.com/python/cpython/pull/129648 https://mail.python.org/archives/list/security-announce@python.org/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4516.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "python3.9", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "RxwFiIUPJYMo6r5lfv+sdQ==": { "id": "RxwFiIUPJYMo6r5lfv+sdQ==", "updater": "rhel-vex", "name": "CVE-2022-47011", "description": "A memory leak flaw was found in binutils. This flaw allows an attacker to use a set of steps to trigger a memory leak and perform a denial of service, resulting in a loss of the system's availability.", "issued": "2022-06-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-47011 https://bugzilla.redhat.com/show_bug.cgi?id=2233992 https://www.cve.org/CVERecord?id=CVE-2022-47011 https://nvd.nist.gov/vuln/detail/CVE-2022-47011 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47011.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "S5Dzz9cigoJDCj8s5UcT0g==": { "id": "S5Dzz9cigoJDCj8s5UcT0g==", "updater": "rhel-vex", "name": "CVE-2022-41409", "description": "A flaw was found in PCRE2, where it is susceptible to an integer overflow vulnerability triggered by a negative repeat value in the pcre2test subject line that causes infinite looping. This flaw allows a remote attacker to pass specially crafted data to the application, initiating an integer overflow and executing a denial of service (DoS) attack.", "issued": "2023-07-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-41409 https://bugzilla.redhat.com/show_bug.cgi?id=2260814 https://www.cve.org/CVERecord?id=CVE-2022-41409 https://nvd.nist.gov/vuln/detail/CVE-2022-41409 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 https://github.com/advisories/GHSA-4qfx-v7wh-3q4j https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-41409.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "pcre2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "SPxMxLW2DZ8IvP04UR/H6g==": { "id": "SPxMxLW2DZ8IvP04UR/H6g==", "updater": "rhel-vex", "name": "CVE-2025-5683", "description": "A flaw was found in qt. Loading a specially crafted ICNS image file within QImage results in a crash. This flaw allows a local attacker to provide a malicious image. The vulnerability is exploited via the image loading process, leading to application termination.", "issued": "2025-06-05T05:31:13Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5683 https://bugzilla.redhat.com/show_bug.cgi?id=2370384 https://www.cve.org/CVERecord?id=CVE-2025-5683 https://nvd.nist.gov/vuln/detail/CVE-2025-5683 https://codereview.qt-project.org/c/qt/qtimageformats/+/644548 https://issues.oss-fuzz.com/issues/415350704 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5683.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "qt5", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Sn+Wd5xIJ9cLZDfoyJlgkw==": { "id": "Sn+Wd5xIJ9cLZDfoyJlgkw==", "updater": "rhel-vex", "name": "CVE-2025-11081", "description": "A vulnerability was detected in GNU Binutils 2.45. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit is now public and may be used. The patch is named f87a66db645caf8cc0e6fc87b0c28c78a38af59b. It is suggested to install a patch to address this issue.", "issued": "2025-09-27T22:02:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11081 https://bugzilla.redhat.com/show_bug.cgi?id=2399944 https://www.cve.org/CVERecord?id=CVE-2025-11081 https://nvd.nist.gov/vuln/detail/CVE-2025-11081 https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt https://sourceware.org/bugzilla/show_bug.cgi?id=33406 https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b https://vuldb.com/?ctiid.326122 https://vuldb.com/?id.326122 https://vuldb.com/?submit.661275 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11081.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "SvhQ7tNvl6ANrVnaJ4cBNw==": { "id": "SvhQ7tNvl6ANrVnaJ4cBNw==", "updater": "rhel-vex", "name": "CVE-2022-3099", "description": "A use-after-free vulnerability was found in vim's do_cmdline() function of the src/ex_docmd.c file. The issue triggers when an invalid line number on :for is ignored. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering use-after-free that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-09-03T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3099 https://bugzilla.redhat.com/show_bug.cgi?id=2124157 https://www.cve.org/CVERecord?id=CVE-2022-3099 https://nvd.nist.gov/vuln/detail/CVE-2022-3099 https://huntr.dev/bounties/403210c7-6cc7-4874-8934-b57f88bd4f5e https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3099.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "T5Nghm4crNWWnUrYvZZItg==": { "id": "T5Nghm4crNWWnUrYvZZItg==", "updater": "rhel-vex", "name": "CVE-2022-2124", "description": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", "issued": "2022-06-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2124 https://bugzilla.redhat.com/show_bug.cgi?id=2099558 https://www.cve.org/CVERecord?id=CVE-2022-2124 https://nvd.nist.gov/vuln/detail/CVE-2022-2124 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2124.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "TEg+H5IUFEuL8/4VudXtEg==": { "id": "TEg+H5IUFEuL8/4VudXtEg==", "updater": "rhel-vex", "name": "CVE-2022-3554", "description": "A flaw was found in LibX11. There is a possible memory leak in the _XimRegisterIMInstantiateCallback() of modules/im/ximcp/imsClbk.c. This issue may lead to limited availability.", "issued": "2022-10-17T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3554 https://bugzilla.redhat.com/show_bug.cgi?id=2136411 https://www.cve.org/CVERecord?id=CVE-2022-3554 https://nvd.nist.gov/vuln/detail/CVE-2022-3554 https://ubuntu.com/security/CVE-2022-3554 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3554.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "libX11", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "TIcWaTRsDD52irGN4xUQyA==": { "id": "TIcWaTRsDD52irGN4xUQyA==", "updater": "rhel-vex", "name": "CVE-2022-2125", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", "issued": "2022-06-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2125 https://bugzilla.redhat.com/show_bug.cgi?id=2099590 https://www.cve.org/CVERecord?id=CVE-2022-2125 https://nvd.nist.gov/vuln/detail/CVE-2022-2125 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2125.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "TNb7OrRxFn2Bis7zp2oi8A==": { "id": "TNb7OrRxFn2Bis7zp2oi8A==", "updater": "rhel-vex", "name": "CVE-2025-9165", "description": "A memory leak flaw was found in LibTIFF. This vulnerability affects the _TIFFmallocExt/_TIFFCheckRealloc/TIFFHashSetNew/InitCCITTFax3 function in the file tools/tiffcmp.c of the tiffcmp component. Executing manipulation can lead to a memory leak. The attack is restricted to local execution.", "issued": "2025-08-19T20:02:13Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9165 https://bugzilla.redhat.com/show_bug.cgi?id=2389574 https://www.cve.org/CVERecord?id=CVE-2025-9165 https://nvd.nist.gov/vuln/detail/CVE-2025-9165 http://www.libtiff.org/ https://drive.google.com/file/d/1FWhmkzksH8-qU0ZM6seBzGNB3aPnX3G8/view?usp=sharing https://gitlab.com/libtiff/libtiff/-/commit/ed141286a37f6e5ddafb5069347ff5d587e7a4e0 https://gitlab.com/libtiff/libtiff/-/issues/728 https://gitlab.com/libtiff/libtiff/-/merge_requests/747 https://vuldb.com/?ctiid.320543 https://vuldb.com/?id.320543 https://vuldb.com/?submit.630506 https://vuldb.com/?submit.630507 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9165.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "TiGGrcjH9zkR+9PywLxD8Q==": { "id": "TiGGrcjH9zkR+9PywLxD8Q==", "updater": "rhel-vex", "name": "CVE-2025-11839", "description": "A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be exploited.", "issued": "2025-10-16T14:02:13Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11839 https://bugzilla.redhat.com/show_bug.cgi?id=2404439 https://www.cve.org/CVERecord?id=CVE-2025-11839 https://nvd.nist.gov/vuln/detail/CVE-2025-11839 https://sourceware.org/bugzilla/attachment.cgi?id=16344 https://sourceware.org/bugzilla/show_bug.cgi?id=33448 https://vuldb.com/?ctiid.328774 https://vuldb.com/?id.328774 https://vuldb.com/?submit.661279 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11839.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "TsVNXuAeF3PhiRZhIOjjtQ==": { "id": "TsVNXuAeF3PhiRZhIOjjtQ==", "updater": "rhel-vex", "name": "CVE-2025-50182", "description": "A flaw was found in urllib3. The library fails to properly validate redirect URLs, allowing an attacker to manipulate redirect chains when used in environments like Pyodide utilizing the JavaScript Fetch API. This lack of validation can enable a remote attacker to control the redirect destination, leading to arbitrary URL redirection. Consequently, an attacker can redirect users to malicious websites. This \nvulnerability stems from a failure to constrain the redirect target.", "issued": "2025-06-19T01:42:44Z", "links": "https://access.redhat.com/security/cve/CVE-2025-50182 https://bugzilla.redhat.com/show_bug.cgi?id=2373800 https://www.cve.org/CVERecord?id=CVE-2025-50182 https://nvd.nist.gov/vuln/detail/CVE-2025-50182 https://github.com/urllib3/urllib3/commit/7eb4a2aafe49a279c29b6d1f0ed0f42e9736194f https://github.com/urllib3/urllib3/security/advisories/GHSA-48p4-8xcf-vxj5 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-50182.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "python-pip", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "TszqopCoskBv4coMA3/peg==": { "id": "TszqopCoskBv4coMA3/peg==", "updater": "rhel-vex", "name": "CVE-2025-1153", "description": "A flaw was found in GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.", "issued": "2025-02-10T19:00:13Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1153 https://bugzilla.redhat.com/show_bug.cgi?id=2344743 https://www.cve.org/CVERecord?id=CVE-2025-1153 https://nvd.nist.gov/vuln/detail/CVE-2025-1153 https://sourceware.org/bugzilla/show_bug.cgi?id=32603 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150 https://vuldb.com/?ctiid.295057 https://vuldb.com/?id.295057 https://vuldb.com/?submit.489991 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1153.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "UBzPfwycyyJOBETwdSTG/w==": { "id": "UBzPfwycyyJOBETwdSTG/w==", "updater": "rhel-vex", "name": "CVE-2024-47814", "description": "A flaw was found in Vim. When closing a buffer visible in a window, a `BufWinLeave` auto command can trigger a use-after-free if this auto command happens to reopen the same buffer in a new split window. This issue can potentially cause Vim to crash, leading to a denial of service.", "issued": "2024-10-07T21:16:01Z", "links": "https://access.redhat.com/security/cve/CVE-2024-47814 https://bugzilla.redhat.com/show_bug.cgi?id=2317096 https://www.cve.org/CVERecord?id=CVE-2024-47814 https://nvd.nist.gov/vuln/detail/CVE-2024-47814 https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3 https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-47814.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Ub9JoNToSyT09hD5MOIlGA==": { "id": "Ub9JoNToSyT09hD5MOIlGA==", "updater": "rhel-vex", "name": "CVE-2025-8961", "description": "A memory corruption flaw was found in libTIFF. This issue affects the May function of the tiffcrop.c file in the tiffcrop component. This attack needs to be approached locally.", "issued": "2025-08-14T12:02:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-8961 https://bugzilla.redhat.com/show_bug.cgi?id=2388541 https://www.cve.org/CVERecord?id=CVE-2025-8961 https://nvd.nist.gov/vuln/detail/CVE-2025-8961 http://www.libtiff.org/ https://drive.google.com/file/d/15L4q2eD8GX3Aj3z6SWC3_FbqaM1ChUx2/view?usp=sharing https://gitlab.com/libtiff/libtiff/-/issues/721 https://gitlab.com/libtiff/libtiff/-/issues/721#note_2670686960 https://vuldb.com/?ctiid.319955 https://vuldb.com/?id.319955 https://vuldb.com/?submit.627957 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8961.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "VWEbeFnFOHy1IkG21b5a5g==": { "id": "VWEbeFnFOHy1IkG21b5a5g==", "updater": "rhel-vex", "name": "CVE-2023-30571", "description": "A vulnerability was found in libarchive. This issue can cause a race condition in a multi-threaded use of archive_write_disk_header() on posix based systems, which could allow implicit directory creation with permissions 777, without sticky bit, which means any low privileged user on the system can delete and rename files inside those directories.", "issued": "2023-05-29T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-30571 https://bugzilla.redhat.com/show_bug.cgi?id=2210921 https://www.cve.org/CVERecord?id=CVE-2023-30571 https://nvd.nist.gov/vuln/detail/CVE-2023-30571 https://access.redhat.com/solutions/7033331 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-30571.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Ve1jg9SxTDjeNdfGHjxP2g==": { "id": "Ve1jg9SxTDjeNdfGHjxP2g==", "updater": "rhel-vex", "name": "CVE-2025-3198", "description": "A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.", "issued": "2025-04-04T01:31:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-3198 https://bugzilla.redhat.com/show_bug.cgi?id=2357358 https://www.cve.org/CVERecord?id=CVE-2025-3198 https://nvd.nist.gov/vuln/detail/CVE-2025-3198 https://sourceware.org/bugzilla/show_bug.cgi?id=32716 https://sourceware.org/bugzilla/show_bug.cgi?id=32716#c0 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d https://vuldb.com/?ctiid.303151 https://vuldb.com/?id.303151 https://vuldb.com/?submit.545773 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3198.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "W0TAw6aTfwXOMlJwloDkZA==": { "id": "W0TAw6aTfwXOMlJwloDkZA==", "updater": "rhel-vex", "name": "CVE-2021-4136", "description": "A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution.", "issued": "2021-12-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-4136 https://bugzilla.redhat.com/show_bug.cgi?id=2034720 https://www.cve.org/CVERecord?id=CVE-2021-4136 https://nvd.nist.gov/vuln/detail/CVE-2021-4136 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4136.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "X10PEbhI2yv6KYFUPacecg==": { "id": "X10PEbhI2yv6KYFUPacecg==", "updater": "rhel-vex", "name": "CVE-2022-1619", "description": "A flaw was found in vim, which is vulnerable to a heap-buffer-overflow in cmdline_erase_chars of the ex_getln.c function. This flaw allows a specially crafted file to crash software, modify memory or execute code when opened in vim.", "issued": "2022-05-08T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-1619 https://bugzilla.redhat.com/show_bug.cgi?id=2083026 https://www.cve.org/CVERecord?id=CVE-2022-1619 https://nvd.nist.gov/vuln/detail/CVE-2022-1619 https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1619.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "X3NBOrSivf9I926V0a2/oQ==": { "id": "X3NBOrSivf9I926V0a2/oQ==", "updater": "rhel-vex", "name": "CVE-2025-6069", "description": "A denial-of-service (DoS) vulnerability has been discovered in Python's html.parser.HTMLParser class. When processing specially malformed HTML input, the parsing runtime can become quadratic with respect to the input size. This significantly increased processing time can lead to excessive resource consumption, ultimately causing a denial-of-service condition in applications that rely on this parser.", "issued": "2025-06-17T13:39:46Z", "links": "https://access.redhat.com/security/cve/CVE-2025-6069 https://bugzilla.redhat.com/show_bug.cgi?id=2373234 https://www.cve.org/CVERecord?id=CVE-2025-6069 https://nvd.nist.gov/vuln/detail/CVE-2025-6069 https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949 https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b https://github.com/python/cpython/issues/135462 https://github.com/python/cpython/pull/135464 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6069.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "python3.9", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "X3WuoMxfqKQH/0bF7PkAAQ==": { "id": "X3WuoMxfqKQH/0bF7PkAAQ==", "updater": "rhel-vex", "name": "CVE-2022-3235", "description": "Use After Free in GitHub repository vim/vim prior to 9.0.0490.", "issued": "2022-09-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3235 https://bugzilla.redhat.com/show_bug.cgi?id=2129371 https://www.cve.org/CVERecord?id=CVE-2022-3235 https://nvd.nist.gov/vuln/detail/CVE-2022-3235 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3235.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "XL1Nv8y45q8aiA92A99YyA==": { "id": "XL1Nv8y45q8aiA92A99YyA==", "updater": "rhel-vex", "name": "CVE-2023-0512", "description": "A divide-by-zero flaw was found in Vim's adjust_skipcol() function in the move.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a floating point exception error and causing an application to crash, eventually leading to a denial of service.", "issued": "2023-01-30T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-0512 https://bugzilla.redhat.com/show_bug.cgi?id=2165798 https://www.cve.org/CVERecord?id=CVE-2023-0512 https://nvd.nist.gov/vuln/detail/CVE-2023-0512 https://huntr.dev/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0512.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "XPUXyp+BOEJyEGOgXafi8Q==": { "id": "XPUXyp+BOEJyEGOgXafi8Q==", "updater": "rhel-vex", "name": "CVE-2022-27943", "description": "A flaw was found in binutils, where GNU GCC is vulnerable to a denial of service caused by a stack consumption in the demangle_const() function in libiberty/rust-demangle.c. The vulnerability exists due to the application not properly controlling the consumption of internal resources. By persuading a victim to open a specially-crafted file, an attacker could cause a denial of service.", "issued": "2022-03-26T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-27943 https://bugzilla.redhat.com/show_bug.cgi?id=2071728 https://www.cve.org/CVERecord?id=CVE-2022-27943 https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-27943.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "gcc", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "XW4X9/W6MfETfE/VICA4Jw==": { "id": "XW4X9/W6MfETfE/VICA4Jw==", "updater": "rhel-vex", "name": "CVE-2025-1376", "description": "A flaw was found in GNU elfutils. This vulnerability allows denial of service via manipulation of the function elf_strptr in /libelf/elf_strptr.c.", "issued": "2025-02-17T04:31:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1376 https://bugzilla.redhat.com/show_bug.cgi?id=2346061 https://www.cve.org/CVERecord?id=CVE-2025-1376 https://nvd.nist.gov/vuln/detail/CVE-2025-1376 https://sourceware.org/bugzilla/attachment.cgi?id=15940 https://sourceware.org/bugzilla/show_bug.cgi?id=32672 https://sourceware.org/bugzilla/show_bug.cgi?id=32672#c3 https://vuldb.com/?ctiid.295984 https://vuldb.com/?id.295984 https://vuldb.com/?submit.497538 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1376.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "elfutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "XWaBdbEJiHpYXT1f1eBk1Q==": { "id": "XWaBdbEJiHpYXT1f1eBk1Q==", "updater": "rhel-vex", "name": "CVE-2022-47007", "description": "A memory leak was found in function stab_demangle_v3_arg in stabs.c in Binutils, allows local attacker to exploit the vulnerability using specially crafted file to cause Denial of Service.", "issued": "2022-06-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-47007 https://bugzilla.redhat.com/show_bug.cgi?id=2233980 https://www.cve.org/CVERecord?id=CVE-2022-47007 https://nvd.nist.gov/vuln/detail/CVE-2022-47007 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47007.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "XuMP4XKeqFlYH9jgvFKXXw==": { "id": "XuMP4XKeqFlYH9jgvFKXXw==", "updater": "rhel-vex", "name": "CVE-2023-2609", "description": "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1531.", "issued": "2023-05-09T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-2609 https://bugzilla.redhat.com/show_bug.cgi?id=2209050 https://www.cve.org/CVERecord?id=CVE-2023-2609 https://nvd.nist.gov/vuln/detail/CVE-2023-2609 https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2609.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Y/6FiFNJ+h2jXNTlPOzrnQ==": { "id": "Y/6FiFNJ+h2jXNTlPOzrnQ==", "updater": "rhel-vex", "name": "CVE-2023-0051", "description": "A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash.", "issued": "2023-01-03T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-0051 https://bugzilla.redhat.com/show_bug.cgi?id=2161348 https://www.cve.org/CVERecord?id=CVE-2023-0051 https://nvd.nist.gov/vuln/detail/CVE-2023-0051 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-0051.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Y6TEBwH0+CoZ50j5sQV23w==": { "id": "Y6TEBwH0+CoZ50j5sQV23w==", "updater": "rhel-vex", "name": "CVE-2021-3968", "description": "A flaw was found in vim. A possible heap use-after-free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability.", "issued": "2021-11-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-3968 https://bugzilla.redhat.com/show_bug.cgi?id=2025056 https://www.cve.org/CVERecord?id=CVE-2021-3968 https://nvd.nist.gov/vuln/detail/CVE-2021-3968 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3968.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "YUwZZ9Cg1FloxBZV60vOCg==": { "id": "YUwZZ9Cg1FloxBZV60vOCg==", "updater": "rhel-vex", "name": "CVE-2022-2522", "description": "A heap buffer overflow vulnerability was found in vim's ins_compl_infercase_gettext() function of the src/insexpand.c file. This flaw occurs when vim tries to access uninitialized memory when completing a long line. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap-based buffer overflow that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-07-25T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2522 https://bugzilla.redhat.com/show_bug.cgi?id=2112299 https://www.cve.org/CVERecord?id=CVE-2022-2522 https://nvd.nist.gov/vuln/detail/CVE-2022-2522 https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2522.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Ygj77GRBaQkoNVODBO6xEQ==": { "id": "Ygj77GRBaQkoNVODBO6xEQ==", "updater": "rhel-vex", "name": "CVE-2025-62813", "description": "No description is available for this CVE.", "issued": "2025-10-23T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-62813 https://bugzilla.redhat.com/show_bug.cgi?id=2405977 https://www.cve.org/CVERecord?id=CVE-2025-62813 https://nvd.nist.gov/vuln/detail/CVE-2025-62813 https://github.com/lz4/lz4/commit/f64efec011c058bd70348576438abac222fe6c82 https://github.com/lz4/lz4/pull/1593 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-62813.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "lz4", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "Z0bbSkX8e3OUKdJa86CbBw==": { "id": "Z0bbSkX8e3OUKdJa86CbBw==", "updater": "rhel-vex", "name": "CVE-2021-4217", "description": "A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.", "issued": "2022-01-14T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-4217 https://bugzilla.redhat.com/show_bug.cgi?id=2044583 https://www.cve.org/CVERecord?id=CVE-2021-4217 https://nvd.nist.gov/vuln/detail/CVE-2021-4217 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4217.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "unzip", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "a8lEoliaJpwjl9bCwQSdLA==": { "id": "a8lEoliaJpwjl9bCwQSdLA==", "updater": "rhel-vex", "name": "CVE-2022-3857", "description": "[REJECTED CVE] A issue has been identified with libpng in png_setup_paeth_row() function. A crafted PNG image from a n attacker can lead to a segmentation fault and Denial of service.", "issued": "2022-11-04T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3857 https://bugzilla.redhat.com/show_bug.cgi?id=2142600 https://www.cve.org/CVERecord?id=CVE-2022-3857 https://nvd.nist.gov/vuln/detail/CVE-2022-3857 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3857.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "libpng", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "a9FllBAJiFi5FeYl0KG4aQ==": { "id": "a9FllBAJiFi5FeYl0KG4aQ==", "updater": "rhel-vex", "name": "CVE-2024-11053", "description": "A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.", "issued": "2024-12-11T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-11053 https://bugzilla.redhat.com/show_bug.cgi?id=2331191 https://www.cve.org/CVERecord?id=CVE-2024-11053 https://nvd.nist.gov/vuln/detail/CVE-2024-11053 https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-11053.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Low", "package": { "id": "", "name": "curl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "aDJK/oIxfKTdGBwKif3CBA==": { "id": "aDJK/oIxfKTdGBwKif3CBA==", "updater": "rhel-vex", "name": "CVE-2025-9086", "description": "1. A cookie is set using the `secure` keyword for `https://target`\n2. curl is redirected to or otherwise made to speak with `http://target` (same\n hostname, but using clear text HTTP) using the same cookie set\n3. The same cookie name is set - but with just a slash as path (`path='/'`).\n Since this site is not secure, the cookie *should* just be ignored.\n4. A bug in the path comparison logic makes curl read outside a heap buffer\n boundary\n\nThe bug either causes a crash or it potentially makes the comparison come to\nthe wrong conclusion and lets the clear-text site override the contents of the\nsecure cookie, contrary to expectations and depending on the memory contents\nimmediately following the single-byte allocation that holds the path.\n\nThe presumed and correct behavior would be to plainly ignore the second set of\nthe cookie since it was already set as secure on a secure host so overriding\nit on an insecure host should not be okay.", "issued": "2025-09-12T05:10:03Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9086 https://bugzilla.redhat.com/show_bug.cgi?id=2394750 https://www.cve.org/CVERecord?id=CVE-2025-9086 https://nvd.nist.gov/vuln/detail/CVE-2025-9086 https://curl.se/docs/CVE-2025-9086.html https://curl.se/docs/CVE-2025-9086.json https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6 https://hackerone.com/reports/3294999 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9086.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "curl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "aQGx6Am8fU9TZmcyiMNL4A==": { "id": "aQGx6Am8fU9TZmcyiMNL4A==", "updater": "rhel-vex", "name": "CVE-2024-43802", "description": "A flaw was found in Vim. This issue may allow a heap-buffer overflow via improper management of the typeahead buffer, leading to crashes when error messages occur in combination with several long mappings.", "issued": "2024-08-26T19:15:07Z", "links": "https://access.redhat.com/security/cve/CVE-2024-43802 https://bugzilla.redhat.com/show_bug.cgi?id=2307995 https://www.cve.org/CVERecord?id=CVE-2024-43802 https://nvd.nist.gov/vuln/detail/CVE-2024-43802 https://github.com/vim/vim/commit/322ba9108612bead5eb https://github.com/vim/vim/security/advisories/GHSA-4ghr-c62x-cqfh https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-43802.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "ah5gJjq6ntKGHe05l2QLEA==": { "id": "ah5gJjq6ntKGHe05l2QLEA==", "updater": "rhel-vex", "name": "CVE-2025-11414", "description": "A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds read in the get_link_hash_entry function in the bfd/elflink.c file due to an improper check, causing a crash and resulting in a denial of service.", "issued": "2025-10-07T22:32:07Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11414 https://bugzilla.redhat.com/show_bug.cgi?id=2402424 https://www.cve.org/CVERecord?id=CVE-2025-11414 https://nvd.nist.gov/vuln/detail/CVE-2025-11414 https://sourceware.org/bugzilla/show_bug.cgi?id=33450 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703 https://vuldb.com/?id.327350 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11414.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "arPTXFJYsCT564EgyQClGA==": { "id": "arPTXFJYsCT564EgyQClGA==", "updater": "rhel-vex", "name": "CVE-2021-31535", "description": "A missing validation flaw was found in libX11. This flaw allows an attacker to inject X11 protocol commands on X clients, and in some cases, also bypass, authenticate (via injection of control characters), or potentially execute arbitrary code with permissions of the application compiled with libX11. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "issued": "2021-05-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-31535 https://bugzilla.redhat.com/show_bug.cgi?id=1961822 https://www.cve.org/CVERecord?id=CVE-2021-31535 https://nvd.nist.gov/vuln/detail/CVE-2021-31535 https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/ https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-31535.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "libX11", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "b2xf65/2S45gOxG8Grxy0g==": { "id": "b2xf65/2S45gOxG8Grxy0g==", "updater": "rhel-vex", "name": "CVE-2023-5441", "description": "A NULL pointer dereference vulnerability was found in Vim. This flaw allows an attacker who can trick a user into processing a specially crafted file to trigger the NULL pointer dereference, causing the application to crash.", "issued": "2023-10-01T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-5441 https://bugzilla.redhat.com/show_bug.cgi?id=2242926 https://www.cve.org/CVERecord?id=CVE-2023-5441 https://nvd.nist.gov/vuln/detail/CVE-2023-5441 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5441.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "bACUKZThWu3kcO82NfO4eg==": { "id": "bACUKZThWu3kcO82NfO4eg==", "updater": "rhel-vex", "name": "CVE-2023-1264", "description": "A NULL pointer dereference vulnerability was discovered in vim's utfc_ptr2len() function in the mbyte.c file. This issue is due to using a NULL pointer with the nested :open command. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an issue that causes an application to crash, leading to a denial of service.", "issued": "2023-03-07T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-1264 https://bugzilla.redhat.com/show_bug.cgi?id=2176413 https://www.cve.org/CVERecord?id=CVE-2023-1264 https://nvd.nist.gov/vuln/detail/CVE-2023-1264 https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1264.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "bNvH54V1y9cXsGaCXVwFVw==": { "id": "bNvH54V1y9cXsGaCXVwFVw==", "updater": "osv/pypi", "name": "GHSA-5rjg-fvgr-3xxf", "description": "setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write", "issued": "2025-05-19T16:52:43Z", "links": "https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf https://nvd.nist.gov/vuln/detail/CVE-2025-47273 https://github.com/pypa/setuptools/issues/4946 https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b https://github.com/pypa/advisory-database/tree/main/vulns/setuptools/PYSEC-2025-49.yaml https://github.com/pypa/setuptools https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88 https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html", "severity": "HIGH", "normalized_severity": "High", "package": { "id": "", "name": "setuptools", "version": "", "kind": "binary", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "pypi", "uri": "https://pypi.org/", "cpe": "" }, "fixed_in_version": "fixed=78.1.1" }, "bf41zTvm6HAv6xdiXpwGWQ==": { "id": "bf41zTvm6HAv6xdiXpwGWQ==", "updater": "rhel-vex", "name": "CVE-2025-32728", "description": "A flaw was found in OpenSSH. In affected versions of sshd, the DisableForwarding directive does not fully adhere to the intended functionality as documented. Specifically, it fails to disable X11 and agent forwarding, which may allow unintended access under certain configurations.", "issued": "2025-04-10T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-32728 https://bugzilla.redhat.com/show_bug.cgi?id=2358767 https://www.cve.org/CVERecord?id=CVE-2025-32728 https://nvd.nist.gov/vuln/detail/CVE-2025-32728 https://lists.mindrot.org/pipermail/openssh-unix-dev/2025-April/041879.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-32728.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "openssh", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "bh7RRRlNP555+LOFASdB0w==": { "id": "bh7RRRlNP555+LOFASdB0w==", "updater": "rhel-vex", "name": "CVE-2022-2980", "description": "A NULL pointer dereference vulnerability was found in vim's do_mouse() function of the src/mouse.c file. The issue occurs with a mouse click when it is not initialized. This flaw allows an attacker to trick a user into opening a specially crafted input file, triggering the vulnerability that could cause an application to crash.", "issued": "2022-08-25T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2980 https://bugzilla.redhat.com/show_bug.cgi?id=2123709 https://www.cve.org/CVERecord?id=CVE-2022-2980 https://nvd.nist.gov/vuln/detail/CVE-2022-2980 https://huntr.dev/bounties/6e7b12a5-242c-453d-b39e-9625d563b0ea https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2980.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "bpwdCug2xQZhmaazCqwIew==": { "id": "bpwdCug2xQZhmaazCqwIew==", "updater": "rhel-vex", "name": "CVE-2023-51767", "description": "An authentication bypass vulnerability was found in a modified version of OpenSSH. When common types of DRAM memory are used, it might allow row hammer attacks because the integer value of authenticated authpassword does not resist flips of a single bit. Exploiting a Rowhammer-style attack to flip bits in memory, forces successful authentication by setting the return code to 0.", "issued": "2023-12-24T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-51767 https://bugzilla.redhat.com/show_bug.cgi?id=2255850 https://www.cve.org/CVERecord?id=CVE-2023-51767 https://nvd.nist.gov/vuln/detail/CVE-2023-51767 https://arxiv.org/abs/2309.02545 https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77 https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-51767.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "openssh", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "by+PAyhAcd2LS2O/tZxbRQ==": { "id": "by+PAyhAcd2LS2O/tZxbRQ==", "updater": "rhel-vex", "name": "CVE-2025-5245", "description": "A denial-of-service vulnerability has been identified in GNU Binutils, affecting versions up to 2.44. The flaw resides within the debug_type_samep function in the /binutils/debug.c file of the objdump component. An attacker with local access can trigger a program crash by manipulating input data, leading to a denial of service for the objdump utility.", "issued": "2025-05-27T14:31:12Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5245 https://bugzilla.redhat.com/show_bug.cgi?id=2368771 https://www.cve.org/CVERecord?id=CVE-2025-5245 https://nvd.nist.gov/vuln/detail/CVE-2025-5245 https://sourceware.org/bugzilla/attachment.cgi?id=16004 https://sourceware.org/bugzilla/show_bug.cgi?id=32829 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a https://vuldb.com/?ctiid.310347 https://vuldb.com/?id.310347 https://vuldb.com/?submit.584635 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5245.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "cMY+6QfPqyOZE380Mf5rIQ==": { "id": "cMY+6QfPqyOZE380Mf5rIQ==", "updater": "rhel-vex", "name": "CVE-2022-0351", "description": "A flaw was found in vim. The vulnerability occurs due to too many recursions, which can lead to a segmentation fault. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", "issued": "2022-01-23T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-0351 https://bugzilla.redhat.com/show_bug.cgi?id=2046436 https://www.cve.org/CVERecord?id=CVE-2022-0351 https://nvd.nist.gov/vuln/detail/CVE-2022-0351 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-0351.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "cbNKZbfbJhPfPLHi6va27w==": { "id": "cbNKZbfbJhPfPLHi6va27w==", "updater": "rhel-vex", "name": "CVE-2022-3555", "description": "A flaw was found in the libX11 package in the_XFreeX11XCBStructure function of the xcb_disp.c file. The manipulation of the argument dpy may lead to a memory leak, resulting in a crash.", "issued": "2022-10-17T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3555 https://bugzilla.redhat.com/show_bug.cgi?id=2136412 https://www.cve.org/CVERecord?id=CVE-2022-3555 https://nvd.nist.gov/vuln/detail/CVE-2022-3555 https://ubuntu.com/security/CVE-2022-3555 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3555.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libX11", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "cjoCrbQlAeGxtTPUlcMPuA==": { "id": "cjoCrbQlAeGxtTPUlcMPuA==", "updater": "rhel-vex", "name": "CVE-2025-26603", "description": "A flaw was found in Vim's :redir command. This vulnerability allows a use-after-free condition via redirecting the :display command to a clipboard register (* or +), which allows access to freed memory.", "issued": "2025-02-18T19:04:24Z", "links": "https://access.redhat.com/security/cve/CVE-2025-26603 https://bugzilla.redhat.com/show_bug.cgi?id=2346346 https://www.cve.org/CVERecord?id=CVE-2025-26603 https://nvd.nist.gov/vuln/detail/CVE-2025-26603 https://github.com/vim/vim/commit/c0f0e2380e5954f4a52a131bf6b8 https://github.com/vim/vim/security/advisories/GHSA-63p5-mwg2-787v https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-26603.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "cxMZ2TEnkk6RdtuU9fDThg==": { "id": "cxMZ2TEnkk6RdtuU9fDThg==", "updater": "rhel-vex", "name": "CVE-2021-3927", "description": "A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "issued": "2021-10-26T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-3927 https://bugzilla.redhat.com/show_bug.cgi?id=2021290 https://www.cve.org/CVERecord?id=CVE-2021-3927 https://nvd.nist.gov/vuln/detail/CVE-2021-3927 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3927.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "d1fus7ZZWC8VndZJIxm7pQ==": { "id": "d1fus7ZZWC8VndZJIxm7pQ==", "updater": "rhel-vex", "name": "CVE-2025-10158", "description": "A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The \n\nmalicious \n\nrsync client requires at least read access to the remote rsync module in order to trigger the issue.", "issued": "2025-11-18T14:24:19Z", "links": "https://access.redhat.com/security/cve/CVE-2025-10158 https://bugzilla.redhat.com/show_bug.cgi?id=2415637 https://www.cve.org/CVERecord?id=CVE-2025-10158 https://nvd.nist.gov/vuln/detail/CVE-2025-10158 https://attackerkb.com/assessments/fbacb2a6-d1cd-4011-bb3a-f06b1c8306b1 https://github.com/RsyncProject/rsync/commit/797e17fc4a6f15e3b1756538a9f812b63942686f https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-10158.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "rsync", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "dF1z6+GpOYLRsG5jdtVmXA==": { "id": "dF1z6+GpOYLRsG5jdtVmXA==", "updater": "rhel-vex", "name": "CVE-2024-42516", "description": "A flaw was found in httpd. The response headers are not sanitized before an HTTP response is sent when a malicious backend can insert a Content-Type, Content-Encoding, or some other headers. These issues lead to HTTP response splitting. This CVE provides a \"complete\" fix for CVE-2023-38709.", "issued": "2025-07-14T07:13:28Z", "links": "https://access.redhat.com/security/cve/CVE-2024-42516 https://bugzilla.redhat.com/show_bug.cgi?id=2374549 https://www.cve.org/CVERecord?id=CVE-2024-42516 https://nvd.nist.gov/vuln/detail/CVE-2024-42516 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-42516.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "httpd", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "dKzgwwkG/spsYd8PVvrk6A==": { "id": "dKzgwwkG/spsYd8PVvrk6A==", "updater": "rhel-vex", "name": "CVE-2023-39804", "description": "A flaw was found in tar. This issue occurs when extended attributes are processed in PAX archives, and could allow an attacker to cause an application crash, resulting in a denial of service.", "issued": "2023-12-11T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-39804 https://bugzilla.redhat.com/show_bug.cgi?id=2254067 https://www.cve.org/CVERecord?id=CVE-2023-39804 https://nvd.nist.gov/vuln/detail/CVE-2023-39804 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-39804.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "tar", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "dO/rj/SVo/ZlfJAB2ajOEQ==": { "id": "dO/rj/SVo/ZlfJAB2ajOEQ==", "updater": "rhel-vex", "name": "CVE-2023-5535", "description": "A heap-based buffer overflow vulnerability was found in some affected packages of Vim. This flaw allows an attacker to send a specially crafted file that could lead to a complete system compromise when opened by a victim.", "issued": "2023-10-10T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-5535 https://bugzilla.redhat.com/show_bug.cgi?id=2244101 https://www.cve.org/CVERecord?id=CVE-2023-5535 https://nvd.nist.gov/vuln/detail/CVE-2023-5535 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-5535.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "dZ/H1sYv9QSX9VO93tlGLw==": { "id": "dZ/H1sYv9QSX9VO93tlGLw==", "updater": "osv/pypi", "name": "GHSA-4xh5-x5gv-qwph", "description": "pip's fallback tar extraction doesn't check symbolic links point to extraction directory", "issued": "2025-09-24T15:31:14Z", "links": "https://nvd.nist.gov/vuln/detail/CVE-2025-8869 https://github.com/pypa/pip/pull/13550 https://github.com/pypa/pip/commit/f2b92314da012b9fffa36b3f3e67748a37ef464a https://github.com/pypa/pip https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN https://pip.pypa.io/en/stable/news/#v25-2", "severity": "MODERATE", "normalized_severity": "Medium", "package": { "id": "", "name": "pip", "version": "", "kind": "binary", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "pypi", "uri": "https://pypi.org/", "cpe": "" }, "fixed_in_version": "fixed=25.3" }, "e/bnYsWq3UNe4TO8qzzb8A==": { "id": "e/bnYsWq3UNe4TO8qzzb8A==", "updater": "rhel-vex", "name": "CVE-2022-47010", "description": "A memory leak flaw was found in binutils in the pr_function_type function. This flaw allows an attacker to use a set of steps to trigger a memory leak and perform a denial of service, resulting in a loss of the system's availability.", "issued": "2022-06-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-47010 https://bugzilla.redhat.com/show_bug.cgi?id=2233988 https://www.cve.org/CVERecord?id=CVE-2022-47010 https://nvd.nist.gov/vuln/detail/CVE-2022-47010 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47010.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "e0VfCD1REapdkagkByCnXQ==": { "id": "e0VfCD1REapdkagkByCnXQ==", "updater": "rhel-vex", "name": "CVE-2025-3360", "description": "A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.", "issued": "2025-04-07T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-3360 https://bugzilla.redhat.com/show_bug.cgi?id=2357754 https://www.cve.org/CVERecord?id=CVE-2025-3360 https://nvd.nist.gov/vuln/detail/CVE-2025-3360 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-3360.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "glib2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "e7h3lwyDkLbzwbeza9/TWw==": { "id": "e7h3lwyDkLbzwbeza9/TWw==", "updater": "rhel-vex", "name": "CVE-2022-4293", "description": "A floating point exception flaw was found in Vim's num_divide() function of the eval.c file. This issue occurs when dividing the largest negative number by -1. This could allow an attacker to trick a user into opening a specially crafted file, triggering an application to crash and leading to a denial of service.", "issued": "2022-12-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-4293 https://bugzilla.redhat.com/show_bug.cgi?id=2151566 https://www.cve.org/CVERecord?id=CVE-2022-4293 https://nvd.nist.gov/vuln/detail/CVE-2022-4293 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4293.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "eekbTUpqIafepE8Hfmhn6g==": { "id": "eekbTUpqIafepE8Hfmhn6g==", "updater": "rhel-vex", "name": "CVE-2021-4187", "description": "A flaw was found in vim. A possible use after free vulnerability could allow an attacker to input a specially crafted file leading to a crash or code execution.", "issued": "2021-12-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-4187 https://bugzilla.redhat.com/show_bug.cgi?id=2036129 https://www.cve.org/CVERecord?id=CVE-2021-4187 https://nvd.nist.gov/vuln/detail/CVE-2021-4187 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4187.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "fSeU4QTAs+fY+ihLpgdM9A==": { "id": "fSeU4QTAs+fY+ihLpgdM9A==", "updater": "rhel-vex", "name": "CVE-2025-1377", "description": "A flaw was found in GNU elfutils. This vulnerability allows denial of service via manipulation of the gelf_getsymshndx function in strip.c.", "issued": "2025-02-17T05:00:19Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1377 https://bugzilla.redhat.com/show_bug.cgi?id=2346066 https://www.cve.org/CVERecord?id=CVE-2025-1377 https://nvd.nist.gov/vuln/detail/CVE-2025-1377 https://sourceware.org/bugzilla/attachment.cgi?id=15941 https://sourceware.org/bugzilla/show_bug.cgi?id=32673 https://sourceware.org/bugzilla/show_bug.cgi?id=32673#c2 https://vuldb.com/?ctiid.295985 https://vuldb.com/?id.295985 https://vuldb.com/?submit.497539 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1377.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "elfutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "fbRJLkkKyAqhMbdbbcLwwg==": { "id": "fbRJLkkKyAqhMbdbbcLwwg==", "updater": "rhel-vex", "name": "CVE-2025-4207", "description": "A flaw was found in PostgreSQL. A buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can lead to process termination.", "issued": "2025-05-08T14:22:45Z", "links": "https://access.redhat.com/security/cve/CVE-2025-4207 https://bugzilla.redhat.com/show_bug.cgi?id=2365111 https://www.cve.org/CVERecord?id=CVE-2025-4207 https://nvd.nist.gov/vuln/detail/CVE-2025-4207 https://www.postgresql.org/support/security/CVE-2025-4207/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-4207.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libpq", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "fdA0Wp/waErtsQk4sTTbPQ==": { "id": "fdA0Wp/waErtsQk4sTTbPQ==", "updater": "rhel-vex", "name": "CVE-2025-8291", "description": "The 'zipfile' module would not check the validity of the ZIP64 End of\nCentral Directory (EOCD) Locator record offset value would not be used to\nlocate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be\nassumed to be the previous record in the ZIP archive. This could be abused\nto create ZIP archives that are handled differently by the 'zipfile' module\ncompared to other ZIP implementations.\n\n\nRemediation maintains this behavior, but checks that the offset specified\nin the ZIP64 EOCD Locator record matches the expected value.", "issued": "2025-10-07T18:10:05Z", "links": "https://access.redhat.com/security/cve/CVE-2025-8291 https://bugzilla.redhat.com/show_bug.cgi?id=2402342 https://www.cve.org/CVERecord?id=CVE-2025-8291 https://nvd.nist.gov/vuln/detail/CVE-2025-8291 https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267 https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6 https://github.com/python/cpython/issues/139700 https://github.com/python/cpython/pull/139702 https://mail.python.org/archives/list/security-announce@python.org/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8291.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "python3.9", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "fh2y5aivazupTx0EZ+2Cag==": { "id": "fh2y5aivazupTx0EZ+2Cag==", "updater": "rhel-vex", "name": "CVE-2025-6075", "description": "A vulnerability in Python’s os.path.expandvars() function that can cause performance degradation. When processing specially crafted, user-controlled input with nested environment variable patterns, the function exhibits quadratic time complexity, potentially leading to excessive CPU usage and denial of service (DoS) conditions. No code execution or data exposure occurs, so the impact is limited to performance slowdown.", "issued": "2025-10-31T16:41:34Z", "links": "https://access.redhat.com/security/cve/CVE-2025-6075 https://bugzilla.redhat.com/show_bug.cgi?id=2408891 https://www.cve.org/CVERecord?id=CVE-2025-6075 https://nvd.nist.gov/vuln/detail/CVE-2025-6075 https://github.com/python/cpython/issues/136065 https://mail.python.org/archives/list/security-announce@python.org/thread/IUP5QJ6D4KK6ULHOMPC7DPNKRYQTQNLA/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-6075.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "python3.9", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "fwfAtjf5gVRneidAp93edQ==": { "id": "fwfAtjf5gVRneidAp93edQ==", "updater": "rhel-vex", "name": "CVE-2025-5917", "description": "A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation.", "issued": "2025-05-20T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5917 https://bugzilla.redhat.com/show_bug.cgi?id=2370874 https://www.cve.org/CVERecord?id=CVE-2025-5917 https://nvd.nist.gov/vuln/detail/CVE-2025-5917 https://github.com/libarchive/libarchive/pull/2588 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5917.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "g6spFzT6DoopzuQCE0pjRg==": { "id": "g6spFzT6DoopzuQCE0pjRg==", "updater": "rhel-vex", "name": "CVE-2022-2285", "description": "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.", "issued": "2022-07-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2285 https://bugzilla.redhat.com/show_bug.cgi?id=2103874 https://www.cve.org/CVERecord?id=CVE-2022-2285 https://nvd.nist.gov/vuln/detail/CVE-2022-2285 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2285.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "g8hJlpBfWMarbfdU+OkQdw==": { "id": "g8hJlpBfWMarbfdU+OkQdw==", "updater": "rhel-vex", "name": "CVE-2024-10524", "description": "A flaw was found in the Wget package. Wget might issue an FTP request to a different host in configurations where the HTTP shorthand format is used with user-provided input. An attacker may be able to use specially crafted input to cause Wget to access an arbitrary host.", "issued": "2024-11-19T14:23:09Z", "links": "https://access.redhat.com/security/cve/CVE-2024-10524 https://bugzilla.redhat.com/show_bug.cgi?id=2327303 https://www.cve.org/CVERecord?id=CVE-2024-10524 https://nvd.nist.gov/vuln/detail/CVE-2024-10524 https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778 https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/ https://seclists.org/oss-sec/2024/q4/107 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-10524.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "wget", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "gGrGej/Pj6/poAgebFb+dg==": { "id": "gGrGej/Pj6/poAgebFb+dg==", "updater": "rhel-vex", "name": "CVE-2022-3352", "description": "Use After Free in GitHub repository vim/vim prior to 9.0.0614.", "issued": "2022-09-29T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3352 https://bugzilla.redhat.com/show_bug.cgi?id=2131087 https://www.cve.org/CVERecord?id=CVE-2022-3352 https://nvd.nist.gov/vuln/detail/CVE-2022-3352 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3352.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "gNGv6C2nj/tHk2ntVJUOWw==": { "id": "gNGv6C2nj/tHk2ntVJUOWw==", "updater": "rhel-vex", "name": "CVE-2022-47011", "description": "A memory leak flaw was found in binutils. This flaw allows an attacker to use a set of steps to trigger a memory leak and perform a denial of service, resulting in a loss of the system's availability.", "issued": "2022-06-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-47011 https://bugzilla.redhat.com/show_bug.cgi?id=2233992 https://www.cve.org/CVERecord?id=CVE-2022-47011 https://nvd.nist.gov/vuln/detail/CVE-2022-47011 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-47011.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "gpPTgXxcA95Uk2vaf3/2dw==": { "id": "gpPTgXxcA95Uk2vaf3/2dw==", "updater": "rhel-vex", "name": "CVE-2023-45803", "description": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.", "issued": "2023-10-13T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-45803 https://bugzilla.redhat.com/show_bug.cgi?id=2246840 https://www.cve.org/CVERecord?id=CVE-2023-45803 https://nvd.nist.gov/vuln/detail/CVE-2023-45803 https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9 https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4 https://www.rfc-editor.org/rfc/rfc9110.html#name-get https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-45803.json", "severity": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "python-pip", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "h+nOQU6khNxAH7kkGqVqkQ==": { "id": "h+nOQU6khNxAH7kkGqVqkQ==", "updater": "rhel-vex", "name": "CVE-2022-3296", "description": "A stack-based buffer overflow vulnerability was found in vim's ex_finally() function of the src/ex_eval.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a bug that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-09-25T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3296 https://bugzilla.redhat.com/show_bug.cgi?id=2129835 https://www.cve.org/CVERecord?id=CVE-2022-3296 https://nvd.nist.gov/vuln/detail/CVE-2022-3296 https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3296.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "h08ca9AawAYymWtiO1A44A==": { "id": "h08ca9AawAYymWtiO1A44A==", "updater": "rhel-vex", "name": "CVE-2025-5916", "description": "A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive.", "issued": "2025-05-20T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-5916 https://bugzilla.redhat.com/show_bug.cgi?id=2370872 https://www.cve.org/CVERecord?id=CVE-2025-5916 https://nvd.nist.gov/vuln/detail/CVE-2025-5916 https://github.com/libarchive/libarchive/pull/2568 https://github.com/libarchive/libarchive/releases/tag/v3.8.0 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-5916.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "hGz8R5Dny4UCIDPZzXbK3g==": { "id": "hGz8R5Dny4UCIDPZzXbK3g==", "updater": "rhel-vex", "name": "CVE-2021-38593", "description": "Qt 5.x before 5.15.6 and 6.x through 6.1.2 has an out-of-bounds write in QOutlineMapper::convertPath (called from QRasterPaintEngine::fill and QPaintEngineEx::stroke).", "issued": "2021-07-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-38593 https://bugzilla.redhat.com/show_bug.cgi?id=1994719 https://www.cve.org/CVERecord?id=CVE-2021-38593 https://nvd.nist.gov/vuln/detail/CVE-2021-38593 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-38593.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "qt5", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "hUC86VV8kD262xFcev0ZiA==": { "id": "hUC86VV8kD262xFcev0ZiA==", "updater": "rhel-vex", "name": "CVE-2025-11412", "description": "A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds read in the bfd_elf_gc_record_vtentry function in the bfd/elflink.c file due to a missing sanity check, causing a crash and resulting in a denial of service.", "issued": "2025-10-07T22:02:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11412 https://bugzilla.redhat.com/show_bug.cgi?id=2402425 https://www.cve.org/CVERecord?id=CVE-2025-11412 https://nvd.nist.gov/vuln/detail/CVE-2025-11412 https://sourceware.org/bugzilla/show_bug.cgi?id=33452 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=047435dd988a3975d40c6626a8f739a0b2e154bc https://vuldb.com/?id.327348 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11412.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "hxluEp8Si16NQcfaJDWcLg==": { "id": "hxluEp8Si16NQcfaJDWcLg==", "updater": "rhel-vex", "name": "CVE-2022-3324", "description": "A stack-based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. The issue occurs when using a negative array index with a negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug, causing an application to crash, possibly executing code and corrupting memory.", "issued": "2022-09-28T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3324 https://bugzilla.redhat.com/show_bug.cgi?id=2132558 https://www.cve.org/CVERecord?id=CVE-2022-3324 https://nvd.nist.gov/vuln/detail/CVE-2022-3324 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3324.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "iPCZH9YqKm3Qb2Qeqw32sA==": { "id": "iPCZH9YqKm3Qb2Qeqw32sA==", "updater": "rhel-vex", "name": "CVE-2025-45582", "description": "A relative path traversal flaw was found in the gnu tar utility. When archives with relative paths are extracted without the ‘--keep-old-files’ (‘-k’), the extraction process may overwrite existing files that the current user has access to. The server may be impacted if these files are critical to the operation of some service.", "issued": "2025-07-11T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-45582 https://bugzilla.redhat.com/show_bug.cgi?id=2379592 https://www.cve.org/CVERecord?id=CVE-2025-45582 https://nvd.nist.gov/vuln/detail/CVE-2025-45582 https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md https://www.gnu.org/software/tar/ https://www.gnu.org/software/tar/manual/html_node/Integrity.html#Integrity https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-45582.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "tar", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "iSzOvPxPGZr2PfJTBTQBCQ==": { "id": "iSzOvPxPGZr2PfJTBTQBCQ==", "updater": "rhel-vex", "name": "CVE-2024-29040", "description": "A flaw was found in the tpm2-tss package, where it was not checked to see if the magic number in the attest is equal to the TPM2_GENERATED_VALUE. This flaw allows an attacker to generate arbitrary quote data, which may not be detected by Fapi_VerifyQuote.", "issued": "2024-04-30T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-29040 https://bugzilla.redhat.com/show_bug.cgi?id=2278077 https://www.cve.org/CVERecord?id=CVE-2024-29040 https://nvd.nist.gov/vuln/detail/CVE-2024-29040 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-29040.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "tpm2-tss", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "ixc06f0H9vqMfsbwQSwwvA==": { "id": "ixc06f0H9vqMfsbwQSwwvA==", "updater": "rhel-vex", "name": "CVE-2023-32636", "description": "A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.", "issued": "2022-12-14T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-32636 https://bugzilla.redhat.com/show_bug.cgi?id=2211833 https://www.cve.org/CVERecord?id=CVE-2023-32636 https://nvd.nist.gov/vuln/detail/CVE-2023-32636 https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-32636.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "glib2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "j7yoSCks+i8LevHtgFwCwQ==": { "id": "j7yoSCks+i8LevHtgFwCwQ==", "updater": "rhel-vex", "name": "CVE-2023-24056", "description": "A flaw was found in pkgconf, where a variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. This issue may lead to a buffer overflow, which can crash the software.", "issued": "2023-01-21T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-24056 https://bugzilla.redhat.com/show_bug.cgi?id=2165034 https://www.cve.org/CVERecord?id=CVE-2023-24056 https://nvd.nist.gov/vuln/detail/CVE-2023-24056 https://nullprogram.com/blog/2023/01/18/ https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24056.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "pkgconf", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "jAwMSdGdL8Maby3fRvFUDA==": { "id": "jAwMSdGdL8Maby3fRvFUDA==", "updater": "rhel-vex", "name": "CVE-2025-11082", "description": "A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with \"[f]ixed for 2.46\".", "issued": "2025-09-27T22:32:09Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11082 https://bugzilla.redhat.com/show_bug.cgi?id=2399943 https://www.cve.org/CVERecord?id=CVE-2025-11082 https://nvd.nist.gov/vuln/detail/CVE-2025-11082 https://sourceware.org/bugzilla/attachment.cgi?id=16358 https://sourceware.org/bugzilla/show_bug.cgi?id=33464 https://sourceware.org/bugzilla/show_bug.cgi?id=33464#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ea1a0737c7692737a644af0486b71e4a392cbca8 https://vuldb.com/?ctiid.326123 https://vuldb.com/?id.326123 https://vuldb.com/?submit.661276 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11082.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "jiVVTQmOtKqVixv7agF/Hg==": { "id": "jiVVTQmOtKqVixv7agF/Hg==", "updater": "rhel-vex", "name": "CVE-2025-27113", "description": "A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.", "issued": "2025-02-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-27113 https://bugzilla.redhat.com/show_bug.cgi?id=2346410 https://www.cve.org/CVERecord?id=CVE-2025-27113 https://nvd.nist.gov/vuln/detail/CVE-2025-27113 https://gitlab.gnome.org/GNOME/libxml2/-/issues/861 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-27113.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "libxml2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "kTyfGInwWoCVv7gGPYCF5g==": { "id": "kTyfGInwWoCVv7gGPYCF5g==", "updater": "rhel-vex", "name": "CVE-2023-2610", "description": "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532.", "issued": "2023-05-10T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-2610 https://bugzilla.redhat.com/show_bug.cgi?id=2209048 https://www.cve.org/CVERecord?id=CVE-2023-2610 https://nvd.nist.gov/vuln/detail/CVE-2023-2610 https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-2610.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "kaUbMItvWrS1leJMEsAk9A==": { "id": "kaUbMItvWrS1leJMEsAk9A==", "updater": "rhel-vex", "name": "CVE-2022-2284", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", "issued": "2022-07-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2284 https://bugzilla.redhat.com/show_bug.cgi?id=2103872 https://www.cve.org/CVERecord?id=CVE-2022-2284 https://nvd.nist.gov/vuln/detail/CVE-2022-2284 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2284.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "lHLNxD93t7uUJfmDhNwvCQ==": { "id": "lHLNxD93t7uUJfmDhNwvCQ==", "updater": "rhel-vex", "name": "CVE-2022-3256", "description": "A heap use-after-free vulnerability was found in vim's movemark() function of the src/mark.c file. This issue occurs because vim uses freed memory when 'autocmd' changes the mark. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-09-22T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3256 https://bugzilla.redhat.com/show_bug.cgi?id=2132571 https://www.cve.org/CVERecord?id=CVE-2022-3256 https://nvd.nist.gov/vuln/detail/CVE-2022-3256 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3256.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "lJ8RTw7m+AgAnWW6upSntA==": { "id": "lJ8RTw7m+AgAnWW6upSntA==", "updater": "rhel-vex", "name": "CVE-2021-45078", "description": "An out-of-bounds flaw was found in binutils’ stabs functionality. The attack needs to be initiated locally where an attacker could convince a victim to read a specially crafted file that is processed by objdump, leading to the disclosure of memory and possibly leading to the execution of arbitrary code or causing the utility to crash.", "issued": "2021-12-14T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-45078 https://bugzilla.redhat.com/show_bug.cgi?id=2033715 https://www.cve.org/CVERecord?id=CVE-2021-45078 https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-45078.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "lWdVDKK0NI1ECjrQyrQZhA==": { "id": "lWdVDKK0NI1ECjrQyrQZhA==", "updater": "rhel-vex", "name": "CVE-2025-11414", "description": "A flaw was found in binutils. Processing a specially crafted object file with the ld linker can trigger an out-of-bounds read in the get_link_hash_entry function in the bfd/elflink.c file due to an improper check, causing a crash and resulting in a denial of service.", "issued": "2025-10-07T22:32:07Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11414 https://bugzilla.redhat.com/show_bug.cgi?id=2402424 https://www.cve.org/CVERecord?id=CVE-2025-11414 https://nvd.nist.gov/vuln/detail/CVE-2025-11414 https://sourceware.org/bugzilla/show_bug.cgi?id=33450 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aeaaa9af6359c8e394ce9cf24911fec4f4d23703 https://vuldb.com/?id.327350 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11414.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "lz6O0nYiDpis8SScmTUuSg==": { "id": "lz6O0nYiDpis8SScmTUuSg==", "updater": "rhel-vex", "name": "CVE-2025-1215", "description": "A flaw was found in Vim. A local user may be able to trigger memory corruption by using the `--log` option with a non-existent path, which can lead to an application crash or other undefined behavior.", "issued": "2025-02-12T18:31:06Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1215 https://bugzilla.redhat.com/show_bug.cgi?id=2345318 https://www.cve.org/CVERecord?id=CVE-2025-1215 https://nvd.nist.gov/vuln/detail/CVE-2025-1215 https://github.com/vim/vim/commit/c5654b84480822817bb7b69ebc97c174c91185e9 https://github.com/vim/vim/issues/16606 https://github.com/vim/vim/releases/tag/v9.1.1097 https://vuldb.com/?ctiid.295174 https://vuldb.com/?id.295174 https://vuldb.com/?submit.497546 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1215.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "m5AiZOpiUf+2oOMwsbQnSg==": { "id": "m5AiZOpiUf+2oOMwsbQnSg==", "updater": "rhel-vex", "name": "CVE-2025-11840", "description": "A weakness has been identified in GNU Binutils 2.45. The affected element is the function vfinfo of the file ldmisc.c. Executing manipulation can lead to out-of-bounds read. The attack can only be executed locally. The exploit has been made available to the public and could be exploited. This patch is called 16357. It is best practice to apply a patch to resolve this issue.", "issued": "2025-10-16T15:32:11Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11840 https://bugzilla.redhat.com/show_bug.cgi?id=2404481 https://www.cve.org/CVERecord?id=CVE-2025-11840 https://nvd.nist.gov/vuln/detail/CVE-2025-11840 https://sourceware.org/bugzilla/attachment.cgi?id=16351 https://sourceware.org/bugzilla/attachment.cgi?id=16357 https://sourceware.org/bugzilla/show_bug.cgi?id=33455 https://vuldb.com/?ctiid.328775 https://vuldb.com/?id.328775 https://vuldb.com/?submit.661281 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11840.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "mmFI4mA7exd6BfbwTUwJfQ==": { "id": "mmFI4mA7exd6BfbwTUwJfQ==", "updater": "rhel-vex", "name": "CVE-2021-20197", "description": "There is an open race window when writing output in the following utilities in GNU binutils1: ar, objcopy, strip, and ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.", "issued": "2021-01-07T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-20197 https://bugzilla.redhat.com/show_bug.cgi?id=1913743 https://www.cve.org/CVERecord?id=CVE-2021-20197 https://nvd.nist.gov/vuln/detail/CVE-2021-20197 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-20197.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "n39YhRffL6tFFAy/S18A8Q==": { "id": "n39YhRffL6tFFAy/S18A8Q==", "updater": "rhel-vex", "name": "CVE-2025-1371", "description": "A flaw was found in GNU elfutils. This vulnerability allows a NULL pointer dereference via the handle_dynamic_symtab function in readelf.c.", "issued": "2025-02-17T02:31:07Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1371 https://bugzilla.redhat.com/show_bug.cgi?id=2346055 https://www.cve.org/CVERecord?id=CVE-2025-1371 https://nvd.nist.gov/vuln/detail/CVE-2025-1371 https://sourceware.org/bugzilla/attachment.cgi?id=15926 https://sourceware.org/bugzilla/show_bug.cgi?id=32655 https://sourceware.org/bugzilla/show_bug.cgi?id=32655#c2 https://vuldb.com/?ctiid.295978 https://vuldb.com/?id.295978 https://vuldb.com/?submit.496484 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1371.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "elfutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "o16kBwzDyL2DXuhbCPWX9Q==": { "id": "o16kBwzDyL2DXuhbCPWX9Q==", "updater": "rhel-vex", "name": "CVE-2021-3572", "description": "A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity.", "issued": "2021-04-24T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-3572 https://bugzilla.redhat.com/show_bug.cgi?id=1962856 https://www.cve.org/CVERecord?id=CVE-2021-3572 https://nvd.nist.gov/vuln/detail/CVE-2021-3572 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-3572.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", "normalized_severity": "Low", "package": { "id": "", "name": "python-pip", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "o8O4Ttqnv0lQfm1yyfyVsw==": { "id": "o8O4Ttqnv0lQfm1yyfyVsw==", "updater": "rhel-vex", "name": "CVE-2022-1720", "description": "A heap buffer over-read vulnerability was found in Vim's grab_file_name() function of the src/findfile.c file. This flaw occurs because the function reads after the NULL terminates the line with \"gf\" in Visual block mode. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap buffer over-read vulnerability that causes an application to crash and corrupt memory.", "issued": "2022-05-13T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-1720 https://bugzilla.redhat.com/show_bug.cgi?id=2099979 https://www.cve.org/CVERecord?id=CVE-2022-1720 https://nvd.nist.gov/vuln/detail/CVE-2022-1720 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1720.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "oGhsPyoyEtiEHT7/0qF+CQ==": { "id": "oGhsPyoyEtiEHT7/0qF+CQ==", "updater": "rhel-vex", "name": "CVE-2025-7545", "description": "A flaw was found in binutils. The `copy_section` function in `binutils/objcopy.c` is susceptible to a heap-based buffer overflow due to improper bounds checking during data copying. This flaw allows a local attacker to provide a specially crafted file. This manipulation can lead to a denial of service.", "issued": "2025-07-13T21:44:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-7545 https://bugzilla.redhat.com/show_bug.cgi?id=2379785 https://www.cve.org/CVERecord?id=CVE-2025-7545 https://nvd.nist.gov/vuln/detail/CVE-2025-7545 https://sourceware.org/bugzilla/attachment.cgi?id=16117 https://sourceware.org/bugzilla/show_bug.cgi?id=33049 https://sourceware.org/bugzilla/show_bug.cgi?id=33049#c1 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944 https://vuldb.com/?ctiid.316243 https://vuldb.com/?id.316243 https://vuldb.com/?submit.614355 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-7545.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "oIBUxFCAPk4vRXBwpcmtFw==": { "id": "oIBUxFCAPk4vRXBwpcmtFw==", "updater": "rhel-vex", "name": "CVE-2022-44840", "description": "A heap-based buffer overflow vulnerability was found in binutils in the find_section_in_set function. This flaw allows an attacker to use a specially crafted payload to trigger a buffer overflow, resulting in issues with availability, confidentiality, and integrity.", "issued": "2022-10-30T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-44840 https://bugzilla.redhat.com/show_bug.cgi?id=2234004 https://www.cve.org/CVERecord?id=CVE-2022-44840 https://nvd.nist.gov/vuln/detail/CVE-2022-44840 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-44840.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "oVgcRSL89qnSRkMXpV8N8A==": { "id": "oVgcRSL89qnSRkMXpV8N8A==", "updater": "rhel-vex", "name": "CVE-2022-2819", "description": "A flaw was found in vim. The vulnerability occurs due to illegal memory access and leads to a heap buffer overflow vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.", "issued": "2022-08-15T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2819 https://bugzilla.redhat.com/show_bug.cgi?id=2118594 https://www.cve.org/CVERecord?id=CVE-2022-2819 https://nvd.nist.gov/vuln/detail/CVE-2022-2819 https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2819.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "oZ/2a9w+ysaJ6Y0prrNk0g==": { "id": "oZ/2a9w+ysaJ6Y0prrNk0g==", "updater": "rhel-vex", "name": "CVE-2025-11081", "description": "A vulnerability was detected in GNU Binutils 2.45. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit is now public and may be used. The patch is named f87a66db645caf8cc0e6fc87b0c28c78a38af59b. It is suggested to install a patch to address this issue.", "issued": "2025-09-27T22:02:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11081 https://bugzilla.redhat.com/show_bug.cgi?id=2399944 https://www.cve.org/CVERecord?id=CVE-2025-11081 https://nvd.nist.gov/vuln/detail/CVE-2025-11081 https://github.com/user-attachments/files/20623354/hdf5_crash_3.txt https://sourceware.org/bugzilla/show_bug.cgi?id=33406 https://sourceware.org/bugzilla/show_bug.cgi?id=33406#c2 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f87a66db645caf8cc0e6fc87b0c28c78a38af59b https://vuldb.com/?ctiid.326122 https://vuldb.com/?id.326122 https://vuldb.com/?submit.661275 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11081.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "oqSc7q4k6wTno/u9knscCQ==": { "id": "oqSc7q4k6wTno/u9knscCQ==", "updater": "rhel-vex", "name": "CVE-2024-9681", "description": "A vulnerability was found in curl. When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than intended.", "issued": "2024-11-06T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-9681 https://bugzilla.redhat.com/show_bug.cgi?id=2322969 https://www.cve.org/CVERecord?id=CVE-2024-9681 https://nvd.nist.gov/vuln/detail/CVE-2024-9681 https://hackerone.com/reports/2764830 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-9681.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "curl", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "oyvtOIVUDqm1ruQx8vhRhA==": { "id": "oyvtOIVUDqm1ruQx8vhRhA==", "updater": "rhel-vex", "name": "CVE-2024-22667", "description": "A stack-based buffer overflow flaw was found in Vim. The did_set_langmap function in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions. That buffer can be overflown, possibly leading to memory corruption and escalation of privileges.", "issued": "2024-02-05T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-22667 https://bugzilla.redhat.com/show_bug.cgi?id=2262999 https://www.cve.org/CVERecord?id=CVE-2024-22667 https://nvd.nist.gov/vuln/detail/CVE-2024-22667 https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-22667.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "q4W6wpO2YbOLS87LUXPVBw==": { "id": "q4W6wpO2YbOLS87LUXPVBw==", "updater": "rhel-vex", "name": "CVE-2025-8851", "description": "A stack based buffer overflow flaw has been discovered in libTIFF. An attacker with local access may be able to craft input to the readSeparateStripsetoBuffer function in the file tools/tiffcrop.c that triggers this flaw. This issue could allow an attacker to achieve local code execution in the context of the affected process.", "issued": "2025-08-11T13:32:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-8851 https://bugzilla.redhat.com/show_bug.cgi?id=2387618 https://www.cve.org/CVERecord?id=CVE-2025-8851 https://nvd.nist.gov/vuln/detail/CVE-2025-8851 http://www.libtiff.org/ https://gitlab.com/libtiff/libtiff/-/commit/8a7a48d7a645992ca83062b3a1873c951661e2b3 https://vuldb.com/?ctiid.319382 https://vuldb.com/?id.319382 https://vuldb.com/?submit.624604 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-8851.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "qEhRdzGH44SGjJIcqcIv/g==": { "id": "qEhRdzGH44SGjJIcqcIv/g==", "updater": "rhel-vex", "name": "CVE-2022-2344", "description": "A heap-based buffer overflow was found in Vim in the ins_compl_add function in the insexpand.c file. This issue occurs due to a read past the end of a buffer when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash, possibly executing code and corrupting memory.", "issued": "2022-07-06T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2344 https://bugzilla.redhat.com/show_bug.cgi?id=2106787 https://www.cve.org/CVERecord?id=CVE-2022-2344 https://nvd.nist.gov/vuln/detail/CVE-2022-2344 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2344.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "qWK7H7gz7e8gS19GJSeIIg==": { "id": "qWK7H7gz7e8gS19GJSeIIg==", "updater": "rhel-vex", "name": "CVE-2022-2889", "description": "A use-after-free vulnerability was found in Vim in the find_var_also_in_script function in the evalvars.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.", "issued": "2022-08-16T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2889 https://bugzilla.redhat.com/show_bug.cgi?id=2119864 https://www.cve.org/CVERecord?id=CVE-2022-2889 https://nvd.nist.gov/vuln/detail/CVE-2022-2889 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2889.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "qYORp6v9x0Jy6S8OKerZvw==": { "id": "qYORp6v9x0Jy6S8OKerZvw==", "updater": "rhel-vex", "name": "CVE-2023-4738", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848.", "issued": "2023-09-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-4738 https://bugzilla.redhat.com/show_bug.cgi?id=2237176 https://www.cve.org/CVERecord?id=CVE-2023-4738 https://nvd.nist.gov/vuln/detail/CVE-2023-4738 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4738.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "qZqMILFWCv2+sfRyc+XFfg==": { "id": "qZqMILFWCv2+sfRyc+XFfg==", "updater": "rhel-vex", "name": "CVE-2025-11083", "description": "A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with \"[f]ixed for 2.46\".", "issued": "2025-09-27T23:02:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11083 https://bugzilla.redhat.com/show_bug.cgi?id=2399948 https://www.cve.org/CVERecord?id=CVE-2025-11083 https://nvd.nist.gov/vuln/detail/CVE-2025-11083 https://sourceware.org/bugzilla/attachment.cgi?id=16353 https://sourceware.org/bugzilla/show_bug.cgi?id=33457 https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490 https://vuldb.com/?ctiid.326124 https://vuldb.com/?id.326124 https://vuldb.com/?submit.661277 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11083.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "qhxrSy/lodS857k/RFYSFg==": { "id": "qhxrSy/lodS857k/RFYSFg==", "updater": "rhel-vex", "name": "CVE-2025-11495", "description": "A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.", "issued": "2025-10-08T20:02:07Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11495 https://bugzilla.redhat.com/show_bug.cgi?id=2402584 https://www.cve.org/CVERecord?id=CVE-2025-11495 https://nvd.nist.gov/vuln/detail/CVE-2025-11495 https://sourceware.org/bugzilla/attachment.cgi?id=16393 https://sourceware.org/bugzilla/show_bug.cgi?id=33502 https://sourceware.org/bugzilla/show_bug.cgi?id=33502#c3 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0 https://vuldb.com/?ctiid.327620 https://vuldb.com/?id.327620 https://vuldb.com/?submit.668290 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11495.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "qug1advw8m4TjVAUPEUPiA==": { "id": "qug1advw8m4TjVAUPEUPiA==", "updater": "rhel-vex", "name": "CVE-2023-4751", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331.", "issued": "2023-09-03T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-4751 https://bugzilla.redhat.com/show_bug.cgi?id=2237187 https://www.cve.org/CVERecord?id=CVE-2023-4751 https://nvd.nist.gov/vuln/detail/CVE-2023-4751 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-4751.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "r3RLKNYtYvKarBqnnrlrew==": { "id": "r3RLKNYtYvKarBqnnrlrew==", "updater": "rhel-vex", "name": "CVE-2022-0529", "description": "A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash.", "issued": "2022-01-24T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-0529 https://bugzilla.redhat.com/show_bug.cgi?id=2051402 https://www.cve.org/CVERecord?id=CVE-2022-0529 https://nvd.nist.gov/vuln/detail/CVE-2022-0529 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-0529.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "unzip", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "r410Z5X0yojDsVg9YVcNqQ==": { "id": "r410Z5X0yojDsVg9YVcNqQ==", "updater": "rhel-vex", "name": "CVE-2022-2182", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", "issued": "2022-06-23T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2182 https://bugzilla.redhat.com/show_bug.cgi?id=2102153 https://www.cve.org/CVERecord?id=CVE-2022-2182 https://nvd.nist.gov/vuln/detail/CVE-2022-2182 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2182.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "rJljaCTiTdw1uI1lvfy+hw==": { "id": "rJljaCTiTdw1uI1lvfy+hw==", "updater": "rhel-vex", "name": "CVE-2023-1170", "description": "A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is access to invalid memory with put in visual block mode. An attacker can trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash, leading to a denial of service.", "issued": "2023-03-04T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-1170 https://bugzilla.redhat.com/show_bug.cgi?id=2176462 https://www.cve.org/CVERecord?id=CVE-2023-1170 https://nvd.nist.gov/vuln/detail/CVE-2023-1170 https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1170.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "rO5a9fYyaqaIZ4bH0M8fdA==": { "id": "rO5a9fYyaqaIZ4bH0M8fdA==", "updater": "rhel-vex", "name": "CVE-2022-2862", "description": "Use After Free in GitHub repository vim/vim prior to 9.0.0221.", "issued": "2022-08-17T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2862 https://bugzilla.redhat.com/show_bug.cgi?id=2122139 https://www.cve.org/CVERecord?id=CVE-2022-2862 https://nvd.nist.gov/vuln/detail/CVE-2022-2862 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2862.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "rR226S9SV4WbmIVotM0CsQ==": { "id": "rR226S9SV4WbmIVotM0CsQ==", "updater": "rhel-vex", "name": "CVE-2023-46246", "description": "Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.", "issued": "2023-10-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-46246 https://bugzilla.redhat.com/show_bug.cgi?id=2246953 https://www.cve.org/CVERecord?id=CVE-2023-46246 https://nvd.nist.gov/vuln/detail/CVE-2023-46246 https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-46246.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "s2uSNGuV+OyVW2eHDGWWKw==": { "id": "s2uSNGuV+OyVW2eHDGWWKw==", "updater": "rhel-vex", "name": "CVE-2025-29768", "description": "A flaw was found in Vim's zip.vim plugin. This vulnerability allows potential data loss via specially crafted zip files when a user views the archive in Vim and presses 'x' on an unusual filename.", "issued": "2025-03-13T17:04:56Z", "links": "https://access.redhat.com/security/cve/CVE-2025-29768 https://bugzilla.redhat.com/show_bug.cgi?id=2352418 https://www.cve.org/CVERecord?id=CVE-2025-29768 https://nvd.nist.gov/vuln/detail/CVE-2025-29768 https://github.com/vim/vim/commit/f209dcd3defb95bae21b2740910e6aa7bb940531 https://github.com/vim/vim/security/advisories/GHSA-693p-m996-3rmf https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-29768.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "s6kt2DqKLHgzYSGciPtGtQ==": { "id": "s6kt2DqKLHgzYSGciPtGtQ==", "updater": "rhel-vex", "name": "CVE-2021-4166", "description": "A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution.", "issued": "2021-12-25T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2021-4166 https://bugzilla.redhat.com/show_bug.cgi?id=2035928 https://www.cve.org/CVERecord?id=CVE-2021-4166 https://nvd.nist.gov/vuln/detail/CVE-2021-4166 https://security.access.redhat.com/data/csaf/v2/vex/2021/cve-2021-4166.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "sAlO/t+jkkm59mLcdOgB9w==": { "id": "sAlO/t+jkkm59mLcdOgB9w==", "updater": "rhel-vex", "name": "CVE-2025-1151", "description": "A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.", "issued": "2025-02-10T17:00:10Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1151 https://bugzilla.redhat.com/show_bug.cgi?id=2344713 https://www.cve.org/CVERecord?id=CVE-2025-1151 https://nvd.nist.gov/vuln/detail/CVE-2025-1151 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295055 https://vuldb.com/?id.295055 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1151.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "sFUeaSTxmIP9ksmZtDFy/w==": { "id": "sFUeaSTxmIP9ksmZtDFy/w==", "updater": "rhel-vex", "name": "CVE-2025-9301", "description": "A reachable assertion flaw has been discovered in the Cmake build system. A local attacker who can construct crafted input could reach this assertion and cause a program crash.", "issued": "2025-08-21T13:32:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9301 https://bugzilla.redhat.com/show_bug.cgi?id=2390085 https://www.cve.org/CVERecord?id=CVE-2025-9301 https://nvd.nist.gov/vuln/detail/CVE-2025-9301 https://drive.google.com/file/d/1TerUqQB8_lzJTwIBCBmE94zn7n-gOz4f/view?usp=sharing https://gitlab.kitware.com/cmake/cmake/-/commit/37e27f71bc356d880c908040cd0cb68fa2c371b8 https://gitlab.kitware.com/cmake/cmake/-/issues/27135 https://gitlab.kitware.com/cmake/cmake/-/issues/27135#note_1691629 https://vuldb.com/?ctiid.320906 https://vuldb.com/?id.320906 https://vuldb.com/?submit.632369 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9301.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "cmake", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "sSpyMuxbh/+/Nula2ikXPw==": { "id": "sSpyMuxbh/+/Nula2ikXPw==", "updater": "rhel-vex", "name": "CVE-2017-17973", "description": "In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue", "issued": "2017-12-29T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2017-17973 https://bugzilla.redhat.com/show_bug.cgi?id=1530912 https://www.cve.org/CVERecord?id=CVE-2017-17973 https://nvd.nist.gov/vuln/detail/CVE-2017-17973 https://security.access.redhat.com/data/csaf/v2/vex/2017/cve-2017-17973.json", "severity": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "safHNTx9xrk8h1d1vBbgbw==": { "id": "safHNTx9xrk8h1d1vBbgbw==", "updater": "rhel-vex", "name": "CVE-2024-43204", "description": "A Server-side request forgery (SSRF) vulnerability exists in Apache httpd when the server has mod_proxy loaded and is configured with mod_headers to modify the Content-Type header in the HTTP request or response using a value supplied by the user. Under this configuration, this flaw allows an attacker to craft specially crafted requests to manipulate the Content-Type header and trigger outbound requests to arbitrary attacker-controlled URLs via proxy. The vulnerability stems from inadequate input validation and unsafe header manipulation, ultimately allowing an attacker to influence server-side network behavior.", "issued": "2025-07-14T07:14:13Z", "links": "https://access.redhat.com/security/cve/CVE-2024-43204 https://bugzilla.redhat.com/show_bug.cgi?id=2374553 https://www.cve.org/CVERecord?id=CVE-2024-43204 https://nvd.nist.gov/vuln/detail/CVE-2024-43204 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-43204.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "normalized_severity": "Medium", "package": { "id": "", "name": "httpd", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "t7yVAsqpoU5oS0/hazJt0w==": { "id": "t7yVAsqpoU5oS0/hazJt0w==", "updater": "rhel-vex", "name": "CVE-2025-53020", "description": "A memory exhaustion flaw has been discovered in the Apache HTTP server. In some instances, the Apache HTTP server fails to free memory. Given sufficient time, this may lead to the host operating system killing the web server in order to reclaim memory.", "issued": "2025-07-10T16:59:06Z", "links": "https://access.redhat.com/security/cve/CVE-2025-53020 https://bugzilla.redhat.com/show_bug.cgi?id=2379343 https://www.cve.org/CVERecord?id=CVE-2025-53020 https://nvd.nist.gov/vuln/detail/CVE-2025-53020 https://httpd.apache.org/security/vulnerabilities_24.html https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-53020.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "httpd", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "tLSR0X6hQ7hvyPbBXZslBQ==": { "id": "tLSR0X6hQ7hvyPbBXZslBQ==", "updater": "rhel-vex", "name": "CVE-2022-2126", "description": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "issued": "2022-06-19T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2126 https://bugzilla.redhat.com/show_bug.cgi?id=2099596 https://www.cve.org/CVERecord?id=CVE-2022-2126 https://nvd.nist.gov/vuln/detail/CVE-2022-2126 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2126.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "tbkEtEs3aa+p2/YQaD8BfQ==": { "id": "tbkEtEs3aa+p2/YQaD8BfQ==", "updater": "rhel-vex", "name": "CVE-2023-1972", "description": "A potential heap-based buffer overflow was found in binutils in the _bfd_elf_slurp_version_tables() function in bfd/elf.c. This issue may lead to a loss of availability.", "issued": "2023-04-10T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-1972 https://bugzilla.redhat.com/show_bug.cgi?id=2185646 https://www.cve.org/CVERecord?id=CVE-2023-1972 https://nvd.nist.gov/vuln/detail/CVE-2023-1972 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-1972.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "tiOci2zd4htCAwtqrJPUhA==": { "id": "tiOci2zd4htCAwtqrJPUhA==", "updater": "rhel-vex", "name": "CVE-2025-9390", "description": "A vulnerability was found in the xxd component of Vim in the main function of src/xxd/xxd.c. This flaw allows a local attacker to trigger a buffer overflow, which leads to a denial of service.", "issued": "2025-08-24T14:02:09Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9390 https://bugzilla.redhat.com/show_bug.cgi?id=2390603 https://www.cve.org/CVERecord?id=CVE-2025-9390 https://nvd.nist.gov/vuln/detail/CVE-2025-9390 https://drive.google.com/file/d/1JLnqrdcGsjUhbYzIEweXIGZyETjHlKtX/view?usp=sharing https://github.com/vim/vim/commit/eeef7c77436a78cd27047b0f5fa6925d56de3cb0 https://github.com/vim/vim/issues/17944 https://github.com/vim/vim/pull/17947 https://github.com/vim/vim/releases/tag/v9.1.1616 https://vuldb.com/?ctiid.321223 https://vuldb.com/?id.321223 https://vuldb.com/?submit.630903 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9390.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "u1caIbS4Tk6y8c7sz8Hvhw==": { "id": "u1caIbS4Tk6y8c7sz8Hvhw==", "updater": "rhel-vex", "name": "CVE-2024-41957", "description": "A double-free and use-after-free vulnerability was found in the Vim editor. This flaw exists due to the corresponding tagstack being used twice when closing the window and if the quick fix list belonging to that window is also cleared using the same tagstack data. In this instance, Vim will try to free the memory again, causing a crash.", "issued": "2024-08-01T20:41:00Z", "links": "https://access.redhat.com/security/cve/CVE-2024-41957 https://bugzilla.redhat.com/show_bug.cgi?id=2302418 https://www.cve.org/CVERecord?id=CVE-2024-41957 https://nvd.nist.gov/vuln/detail/CVE-2024-41957 https://github.com/vim/vim/commit/8a0bbe7b8aad6f8da28dee218c01bc8a0185a https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-hcr4 https://security.access.redhat.com/data/csaf/v2/vex/2024/cve-2024-41957.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "uDfc8ZaPfrhTGcFwVaIvAA==": { "id": "uDfc8ZaPfrhTGcFwVaIvAA==", "updater": "rhel-vex", "name": "CVE-2023-48706", "description": "A heap use-after-free flaw was found in the vim package. When executing a `:s` command for the first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes memory to be freed, which may later then be accessed by the initial `:s` command. This issue may result in Vim crashing.", "issued": "2023-11-22T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-48706 https://bugzilla.redhat.com/show_bug.cgi?id=2251118 https://www.cve.org/CVERecord?id=CVE-2023-48706 https://nvd.nist.gov/vuln/detail/CVE-2023-48706 http://www.openwall.com/lists/oss-security/2023/11/22/3 https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-48706.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "uEn9qA67O/SoYHOtH/EL2w==": { "id": "uEn9qA67O/SoYHOtH/EL2w==", "updater": "rhel-vex", "name": "CVE-2025-1150", "description": "A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.", "issued": "2025-02-10T16:31:07Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1150 https://bugzilla.redhat.com/show_bug.cgi?id=2344681 https://www.cve.org/CVERecord?id=CVE-2025-1150 https://nvd.nist.gov/vuln/detail/CVE-2025-1150 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295054 https://vuldb.com/?id.295054 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1150.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "uFXEnN9gepJ4+HtQWdLrOg==": { "id": "uFXEnN9gepJ4+HtQWdLrOg==", "updater": "rhel-vex", "name": "CVE-2023-25433", "description": "A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to a heap-based buffer overflow in the processCropSelections function in tools/tiffcrop.c, resulting in a denial of service.", "issued": "2023-01-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-25433 https://bugzilla.redhat.com/show_bug.cgi?id=2218744 https://www.cve.org/CVERecord?id=CVE-2023-25433 https://nvd.nist.gov/vuln/detail/CVE-2023-25433 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25433.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "uO3OOEY6W3k9QH/tNVK0LQ==": { "id": "uO3OOEY6W3k9QH/tNVK0LQ==", "updater": "rhel-vex", "name": "CVE-2025-1152", "description": "A flaw was found in the ld linker utility of GNU Binutils. A specially-crafted payload may be able to trigger a memory leak, which can lead to an application crash or other undefined behavior.", "issued": "2025-02-10T18:00:09Z", "links": "https://access.redhat.com/security/cve/CVE-2025-1152 https://bugzilla.redhat.com/show_bug.cgi?id=2344723 https://www.cve.org/CVERecord?id=CVE-2025-1152 https://nvd.nist.gov/vuln/detail/CVE-2025-1152 https://sourceware.org/bugzilla/attachment.cgi?id=15887 https://sourceware.org/bugzilla/show_bug.cgi?id=32576 https://vuldb.com/?ctiid.295056 https://vuldb.com/?id.295056 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-1152.json", "severity": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "binutils", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "uglqkYqbcsDd4SCu9NI2Ww==": { "id": "uglqkYqbcsDd4SCu9NI2Ww==", "updater": "rhel-vex", "name": "CVE-2023-25435", "description": "A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to a heap-based buffer overflow in the extractContigSamplesShifted8bits function in tools/tiffcrop.c, resulting in a denial of service.", "issued": "2023-01-27T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-25435 https://bugzilla.redhat.com/show_bug.cgi?id=2216614 https://www.cve.org/CVERecord?id=CVE-2023-25435 https://nvd.nist.gov/vuln/detail/CVE-2023-25435 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-25435.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libtiff", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "w1094TrprBpG+5TZJus6FA==": { "id": "w1094TrprBpG+5TZJus6FA==", "updater": "rhel-vex", "name": "CVE-2022-1674", "description": "A NULL pointer dereference flaw was found in vim's vim_regexec_string() function in regexp.c file. The issue occurs when the function tries to match the buffer with an invalid pattern. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a NULL pointer dereference that causes an application to crash, leading to a denial of service.", "issued": "2022-05-12T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-1674 https://bugzilla.redhat.com/show_bug.cgi?id=2085393 https://www.cve.org/CVERecord?id=CVE-2022-1674 https://nvd.nist.gov/vuln/detail/CVE-2022-1674 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1674.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "w8af/LTYrBLWhYkZBSi2Lg==": { "id": "w8af/LTYrBLWhYkZBSi2Lg==", "updater": "rhel-vex", "name": "CVE-2022-4141", "description": "A heap-based buffer overflow vulnerability was found in Vim due to invalid memory access. This issue could allow an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory.", "issued": "2022-11-25T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-4141 https://bugzilla.redhat.com/show_bug.cgi?id=2148991 https://www.cve.org/CVERecord?id=CVE-2022-4141 https://nvd.nist.gov/vuln/detail/CVE-2022-4141 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-4141.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "xKFSWwGN4NIDnytC6SdEvg==": { "id": "xKFSWwGN4NIDnytC6SdEvg==", "updater": "rhel-vex", "name": "CVE-2025-9714", "description": "A flaw was found in libxstl/libxml2. The 'exsltDynMapFunction' function in libexslt/dynamic.c does not contain a recursion depth check, which may cause an infinite loop via a specially crafted XSLT document while handling 'dyn:map()', leading to stack exhaustion and a local denial of service.", "issued": "2025-09-02T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-9714 https://bugzilla.redhat.com/show_bug.cgi?id=2392605 https://www.cve.org/CVERecord?id=CVE-2025-9714 https://nvd.nist.gov/vuln/detail/CVE-2025-9714 https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21 https://gitlab.gnome.org/GNOME/libxslt/-/issues/148 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-9714.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libxml2", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "xQ6R88+x8IssPvOAavmZXw==": { "id": "xQ6R88+x8IssPvOAavmZXw==", "updater": "rhel-vex", "name": "CVE-2022-0530", "description": "A flaw was found in Unzip. The vulnerability occurs during the conversion of a UTF-8 string to a local string that leads to a segmentation fault. This flaw allows an attacker to input a specially crafted zip file, leading to a crash.", "issued": "2022-01-31T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-0530 https://bugzilla.redhat.com/show_bug.cgi?id=2051395 https://www.cve.org/CVERecord?id=CVE-2022-0530 https://nvd.nist.gov/vuln/detail/CVE-2022-0530 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-0530.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "unzip", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "xxrOMZzPk7ETmnvrIjBo0A==": { "id": "xxrOMZzPk7ETmnvrIjBo0A==", "updater": "rhel-vex", "name": "CVE-2025-60753", "description": "A vulnerability in apply_substitution() function in libarchive's bsdtar allows crafted -s substitution rules to repeatedly match a zero-length substring and append replacements without advancing the input pointer. When the rule uses the global /g flag (or an explicitly empty pattern), this leads to unbounded output allocation and eventual process OOM (Denial of Service). Upgrade to libarchive 3.8.1 or apply a patch that prevents zero-length match loops or rejects empty patterns.", "issued": "2025-11-05T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-60753 https://bugzilla.redhat.com/show_bug.cgi?id=2412648 https://www.cve.org/CVERecord?id=CVE-2025-60753 https://nvd.nist.gov/vuln/detail/CVE-2025-60753 https://github.com/Papya-j/CVE/tree/main/CVE-2025-60753 https://github.com/libarchive/libarchive/issues/2725 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-60753.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "libarchive", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "y1Qpo5IDwj5DRizBbMgltw==": { "id": "y1Qpo5IDwj5DRizBbMgltw==", "updater": "rhel-vex", "name": "CVE-2025-59375", "description": "A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.", "issued": "2025-09-15T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2025-59375 https://bugzilla.redhat.com/show_bug.cgi?id=2395108 https://www.cve.org/CVERecord?id=CVE-2025-59375 https://nvd.nist.gov/vuln/detail/CVE-2025-59375 https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74 https://github.com/libexpat/libexpat/issues/1018 https://github.com/libexpat/libexpat/pull/1034 https://issues.oss-fuzz.com/issues/439133977 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-59375.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "High", "package": { "id": "", "name": "expat", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "y64mIHRpNx52AEpoGbOyzQ==": { "id": "y64mIHRpNx52AEpoGbOyzQ==", "updater": "rhel-vex", "name": "CVE-2025-11839", "description": "A security flaw has been discovered in GNU Binutils 2.45. Impacted is the function tg_tag_type of the file prdbg.c. Performing manipulation results in unchecked return value. The attack needs to be approached locally. The exploit has been released to the public and may be exploited.", "issued": "2025-10-16T14:02:13Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11839 https://bugzilla.redhat.com/show_bug.cgi?id=2404439 https://www.cve.org/CVERecord?id=CVE-2025-11839 https://nvd.nist.gov/vuln/detail/CVE-2025-11839 https://sourceware.org/bugzilla/attachment.cgi?id=16344 https://sourceware.org/bugzilla/show_bug.cgi?id=33448 https://vuldb.com/?ctiid.328774 https://vuldb.com/?id.328774 https://vuldb.com/?submit.661279 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11839.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "y6Uu3YyF1CrzpsmxAF1m9w==": { "id": "y6Uu3YyF1CrzpsmxAF1m9w==", "updater": "rhel-vex", "name": "CVE-2025-11083", "description": "A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with \"[f]ixed for 2.46\".", "issued": "2025-09-27T23:02:08Z", "links": "https://access.redhat.com/security/cve/CVE-2025-11083 https://bugzilla.redhat.com/show_bug.cgi?id=2399948 https://www.cve.org/CVERecord?id=CVE-2025-11083 https://nvd.nist.gov/vuln/detail/CVE-2025-11083 https://sourceware.org/bugzilla/attachment.cgi?id=16353 https://sourceware.org/bugzilla/show_bug.cgi?id=33457 https://sourceware.org/bugzilla/show_bug.cgi?id=33457#c1 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=9ca499644a21ceb3f946d1c179c38a83be084490 https://vuldb.com/?ctiid.326124 https://vuldb.com/?id.326124 https://vuldb.com/?submit.661277 https://www.gnu.org/ https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-11083.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "normalized_severity": "Medium", "package": { "id": "", "name": "gdb", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "ydN/9qW+IO/7qUsy09APhw==": { "id": "ydN/9qW+IO/7qUsy09APhw==", "updater": "rhel-vex", "name": "CVE-2023-24607", "description": "Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3.", "issued": "2023-04-15T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2023-24607 https://bugzilla.redhat.com/show_bug.cgi?id=2187154 https://www.cve.org/CVERecord?id=CVE-2023-24607 https://nvd.nist.gov/vuln/detail/CVE-2023-24607 https://security.access.redhat.com/data/csaf/v2/vex/2023/cve-2023-24607.json", "severity": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "normalized_severity": "Medium", "package": { "id": "", "name": "qt5", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "ylg3k+AtgUcIl3hJiXNMlw==": { "id": "ylg3k+AtgUcIl3hJiXNMlw==", "updater": "rhel-vex", "name": "CVE-2022-2946", "description": "A flaw was found in vim, where it is vulnerable to a use-after-free in the vim_vsnprintf_typval function. This flaw allows a specially crafted file to crash a program, use unexpected values, or execute code.", "issued": "2022-08-23T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2946 https://bugzilla.redhat.com/show_bug.cgi?id=2120993 https://www.cve.org/CVERecord?id=CVE-2022-2946 https://nvd.nist.gov/vuln/detail/CVE-2022-2946 https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2946.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "zAQhwfD+1kpXY0CwZC6HxA==": { "id": "zAQhwfD+1kpXY0CwZC6HxA==", "updater": "rhel-vex", "name": "CVE-2025-24014", "description": "A flaw was found in Vim. In silent Ex mode (-s -e), Vim typically doesn't show a screen and operates silently in batch mode, however, it is possible to trigger the function that handles the scrolling of a GUI version of Vim via binary characters. The function that handles the scrolling may trigger a redraw, which will access the ScreenLines pointer and can cause a segmentation fault condition. This may lead to an application crash or other undefined behavior.", "issued": "2025-01-20T22:53:14Z", "links": "https://access.redhat.com/security/cve/CVE-2025-24014 https://bugzilla.redhat.com/show_bug.cgi?id=2339074 https://www.cve.org/CVERecord?id=CVE-2025-24014 https://nvd.nist.gov/vuln/detail/CVE-2025-24014 https://github.com/vim/vim/commit/9d1bed5eccdbb46a26b8a484f5e9163c40e63919 https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955 https://security.access.redhat.com/data/csaf/v2/vex/2025/cve-2025-24014.json", "severity": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "zDmU3WG0c3AQYw7NFebUCQ==": { "id": "zDmU3WG0c3AQYw7NFebUCQ==", "updater": "rhel-vex", "name": "CVE-2022-3234", "description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.", "issued": "2022-09-18T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-3234 https://bugzilla.redhat.com/show_bug.cgi?id=2129370 https://www.cve.org/CVERecord?id=CVE-2022-3234 https://nvd.nist.gov/vuln/detail/CVE-2022-3234 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-3234.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "zoCeQAIu1TFmWIYHnlYddg==": { "id": "zoCeQAIu1TFmWIYHnlYddg==", "updater": "rhel-vex", "name": "CVE-2022-2183", "description": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", "issued": "2022-06-23T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-2183 https://bugzilla.redhat.com/show_bug.cgi?id=2102159 https://www.cve.org/CVERecord?id=CVE-2022-2183 https://nvd.nist.gov/vuln/detail/CVE-2022-2183 https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-2183.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" }, "zx97OaxgXH8j+mFWesQySQ==": { "id": "zx97OaxgXH8j+mFWesQySQ==", "updater": "rhel-vex", "name": "CVE-2022-1620", "description": "A flaw was found in vim, which is vulnerable to a NULL pointer dereference in vim_regexec_string() of the regexp.c function. This flaw allows a specially crafted file to crash software when opened in vim.", "issued": "2022-05-08T00:00:00Z", "links": "https://access.redhat.com/security/cve/CVE-2022-1620 https://bugzilla.redhat.com/show_bug.cgi?id=2083029 https://www.cve.org/CVERecord?id=CVE-2022-1620 https://nvd.nist.gov/vuln/detail/CVE-2022-1620 https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51/ https://security.access.redhat.com/data/csaf/v2/vex/2022/cve-2022-1620.json", "severity": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "normalized_severity": "Low", "package": { "id": "", "name": "vim", "version": "", "kind": "source", "normalized_version": "", "cpe": "" }, "distribution": { "id": "", "did": "", "name": "", "version": "", "version_code_name": "", "version_id": "", "arch": "", "cpe": "", "pretty_name": "" }, "repository": { "name": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*", "key": "rhel-cpe-repository", "cpe": "cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*" }, "fixed_in_version": "" } }, "package_vulnerabilities": { "+bwl6UbMaWOBWdHNekJsEw==": [ "AD3UsMwxeXvBzVWIm5l5yw==" ], "/Bb6eVO+je9kbuIGTvt6Ww==": [ "/rVEaWl0l9u8biVEKbZTFg==" ], "/l8wc0qlQdZdqgMIy+AX4w==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "/r9XRETcIT4sCg595ze+cA==": [ "sFUeaSTxmIP9ksmZtDFy/w==" ], "09iCgGFB6KlEK9g5KeyifA==": [ "AsiuN/8gu7sZ0PJCLihjmw==" ], "1XXuvf69/0I2dNHaU2UndQ==": [ "/wfob5jHHezdiyugtfPWjg==" ], "1p1wTPVFlokLdC9/X3ksGg==": [ "y1Qpo5IDwj5DRizBbMgltw==" ], "1pWwHIWE2UYOVNkFfcPZhQ==": [ "RdY/UQx2FGTtVn1x7G1KkA==", "HxI42iSjURjRki+uV6q/9w==" ], "295Mf6xxPMSuYkMc24cf0A==": [ "dF1z6+GpOYLRsG5jdtVmXA==", "t7yVAsqpoU5oS0/hazJt0w==", "safHNTx9xrk8h1d1vBbgbw==" ], "2QUKRSh7NN4cTp6+OOEm8w==": [ "6GILJqctNxTbZFPR6fLtoA==", "d1fus7ZZWC8VndZJIxm7pQ==" ], "2gCbp4kt+cF44NF/LqukDg==": [ "S5Dzz9cigoJDCj8s5UcT0g==" ], "2zIvfSXFI57wQ4jcmb8tGg==": [ "dZ/H1sYv9QSX9VO93tlGLw==" ], "35MvZs/A5NUjD+xZ1Vlnyw==": [ "j7yoSCks+i8LevHtgFwCwQ==" ], "3JODNwsCAiV/sk6j3hiOxw==": [ "dF1z6+GpOYLRsG5jdtVmXA==", "t7yVAsqpoU5oS0/hazJt0w==", "safHNTx9xrk8h1d1vBbgbw==" ], "3xX+GtMW5t5rNj/zejJWEQ==": [ "y1Qpo5IDwj5DRizBbMgltw==" ], "40gZpuDvr8Y82hwRT4gOdw==": [ "bNvH54V1y9cXsGaCXVwFVw==", "QGq5D5QwQKPerzYOBVoSsg==", "Jl0PQIP9L3ufSvQ2j71iww==", "Qd2XnJZ3qaQ3AbyDXUaR2A==", "Pj9V3uC2c9o+P6lTpzzGeA==" ], "4xm12R/wZXmG2Cs/ve2Zjw==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "5JAFUJWmy04+T6x2oJw2jg==": [ "AwYRRq6SmgfJLn2NZxQUdw==", "jiVVTQmOtKqVixv7agF/Hg==", "FE/mnRiATGHgivPxG+13dw==", "xKFSWwGN4NIDnytC6SdEvg==", "8kndQj/aRn+NNJdGVP9v4g==" ], "5j7LQGobcmm2zwYTgrA27g==": [ "6hAQW3vY9ZA/8datv1rY4g==", "2TDjlt2gAEWsLyBBPigFYw==", "7cHovEEcBoQ92zXTfFigow==" ], "79w3HVLsEs5/x4dQ41zIww==": [ "dF1z6+GpOYLRsG5jdtVmXA==", "t7yVAsqpoU5oS0/hazJt0w==", "safHNTx9xrk8h1d1vBbgbw==" ], "8/+OIixLXu+fX/6UoQwl/g==": [ "Mo/R2a7u4vWlPy8O1jH7HQ==" ], "8WvHUwfWJkE1eIMXK0EUTA==": [ "X3NBOrSivf9I926V0a2/oQ==", "RxiYxX3H5lL8cc7k0ac/mQ==", "GW37uYQxwwgJBIDtA/dT2g==", "fdA0Wp/waErtsQk4sTTbPQ==", "fh2y5aivazupTx0EZ+2Cag==" ], "A5zg77FwqyQ7YbgSi5bkFw==": [ "0ISEnYRRDkbJFXBP9XvdpA==", "Q1F3DVZZ3gpMNQT3yhbiSg==", "7S6xxC9g1Ybp0dqQ63V8tg==" ], "AUjudWCWcMUZtLYqynIMkg==": [ "iSzOvPxPGZr2PfJTBTQBCQ==" ], "AsexXT9SbeDFWXwi6d7SxQ==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "At9otkYcx2c7gDG/+qxMog==": [ "AwYRRq6SmgfJLn2NZxQUdw==", "jiVVTQmOtKqVixv7agF/Hg==", "FE/mnRiATGHgivPxG+13dw==", "xKFSWwGN4NIDnytC6SdEvg==", "8kndQj/aRn+NNJdGVP9v4g==" ], "BBozCOtHwec3Xfe7j7ZMUw==": [ "dF1z6+GpOYLRsG5jdtVmXA==", "t7yVAsqpoU5oS0/hazJt0w==", "safHNTx9xrk8h1d1vBbgbw==" ], "BIzbOPagaosMprtM0oW/UQ==": [ "8QRmG/+fMsQQzP2maaxOag==" ], "Cn4UOizx3r/8sEEZ0cgGfw==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "DVWG3mWD7odZzCgFCUPZPw==": [ "j7yoSCks+i8LevHtgFwCwQ==" ], "Dr450EIuIZqHVptoUeerYQ==": [ "a8lEoliaJpwjl9bCwQSdLA==" ], "ESNqe3PeaOUuYEzUgxfVAA==": [ "X3NBOrSivf9I926V0a2/oQ==", "RxiYxX3H5lL8cc7k0ac/mQ==", "GW37uYQxwwgJBIDtA/dT2g==", "fdA0Wp/waErtsQk4sTTbPQ==", "fh2y5aivazupTx0EZ+2Cag==" ], "EhaFwS5l8+kj0ips0KX28g==": [ "8efBqSZ3OYqd+nT8a21FNA==", "OXr+UvfSDAQbLGP4xOBSMw==", "Rd2hVVbUws+mcvoC7DaoiQ==", "TIcWaTRsDD52irGN4xUQyA==", "GXMpRf2go/wGEbwpp9BPPQ==", "T5Nghm4crNWWnUrYvZZItg==", "BfDjqoaYrd0NKCGGxtokTg==", "tiOci2zd4htCAwtqrJPUhA==", "w8af/LTYrBLWhYkZBSi2Lg==", "Ah03jmj/7fQOqUbg05PtZg==", "rJljaCTiTdw1uI1lvfy+hw==", "2I/0B+uXhxpPJWXGwNGlLw==", "6o8ui0RxMttDzkyqTDO5tg==", "LkJjju2s50oKpBRyBT8s0A==", "Qe1reyLPtQVZ5wKqKa9jQA==", "s2uSNGuV+OyVW2eHDGWWKw==", "cMY+6QfPqyOZE380Mf5rIQ==", "9avTgsTrB6zaN8UjZ37Wow==", "kTyfGInwWoCVv7gGPYCF5g==", "1WQ/LJu/kefEuHRv58l0Lw==", "MLyBE3p9/9+LMOMl2JBi6w==", "e7h3lwyDkLbzwbeza9/TWw==", "2sm08sXcjWtT2Gtu3CdSug==", "2RZ3u6UmceVG9iB/xb73SA==", "QbgvVzhz2dr5BDvAUM6wFQ==", "rR226S9SV4WbmIVotM0CsQ==", "GfPY5zBbHJQI4ZGaDcJj2A==", "cjoCrbQlAeGxtTPUlcMPuA==", "rO5a9fYyaqaIZ4bH0M8fdA==", "bh7RRRlNP555+LOFASdB0w==", "Ob+LJ5zYHnbjt14Yf8W7UA==", "Q0D37bmhhLGtYILIAMgFXg==", "gGrGej/Pj6/poAgebFb+dg==", "QX9gQ7esz1e73iQHmwojXA==", "GnBCRP9H+R6do428z3nOkQ==", "NeZAaBfGrzLvaMKrJL7WlA==", "0YVxD0vSH+0MhijemP/Jmg==", "SvhQ7tNvl6ANrVnaJ4cBNw==", "zx97OaxgXH8j+mFWesQySQ==", "3Lvdmj//2sze9S8I3n8yrw==", "aQGx6Am8fU9TZmcyiMNL4A==", "JD0llI0bGUOG/VBz+9LeVQ==", "kaUbMItvWrS1leJMEsAk9A==", "19Kvl4LS7MCiBo2cRD5fxQ==", "b2xf65/2S45gOxG8Grxy0g==", "YUwZZ9Cg1FloxBZV60vOCg==", "cxMZ2TEnkk6RdtuU9fDThg==", "7AoZZiCMmvqX9d9WD62FnQ==", "eekbTUpqIafepE8Hfmhn6g==", "00cDk2w3qfvdzMbO27c/+w==", "BS5Qx6nN3HmM64VVoKmayw==", "lz6O0nYiDpis8SScmTUuSg==", "g6spFzT6DoopzuQCE0pjRg==", "X3WuoMxfqKQH/0bF7PkAAQ==", "3WRC4Vl08/leTJ1MFHuCEg==", "DNd0sdbW83acQbIl3FDaPw==", "Y/6FiFNJ+h2jXNTlPOzrnQ==", "5D5WFK01Su4Lrj4hhwDYGQ==", "zAQhwfD+1kpXY0CwZC6HxA==", "2UHqEqfMIIn53NkDlDEppQ==", "ylg3k+AtgUcIl3hJiXNMlw==", "dO/rj/SVo/ZlfJAB2ajOEQ==", "I3vwwgMxzxWo15otCOgvAw==", "o8O4Ttqnv0lQfm1yyfyVsw==", "+hBhqk1qKnkU+nqn6a96qg==", "tLSR0X6hQ7hvyPbBXZslBQ==", "oVgcRSL89qnSRkMXpV8N8A==", "HlOu0EmTxHkjzmJeJEuJmw==", "93O9BjbBwz1jYmTNCzgkUw==", "h+nOQU6khNxAH7kkGqVqkQ==", "6asSIEJz7ggo9QEXpbSOYg==", "AIlN8RmMOvhBveVuVAyHQQ==", "w1094TrprBpG+5TZJus6FA==", "XuMP4XKeqFlYH9jgvFKXXw==", "6dwQWrojfQ/1hgTT2PQckg==", "u1caIbS4Tk6y8c7sz8Hvhw==", "qWK7H7gz7e8gS19GJSeIIg==", "W0TAw6aTfwXOMlJwloDkZA==", "oyvtOIVUDqm1ruQx8vhRhA==", "+PjI2yN4wCMPyf1oygeT5Q==", "bACUKZThWu3kcO82NfO4eg==", "8ge47rqVvHaefMV4OlZnlQ==", "XL1Nv8y45q8aiA92A99YyA==", "0v5F4x1W0RxkklLvRs6NKQ==", "JtGggrfMckWn0xvfWBMJJQ==", "KsboTEAsiwsdLEKIDivkyA==", "0bK7Vo3x9SXQYvDvMmgzXA==", "qEhRdzGH44SGjJIcqcIv/g==", "zDmU3WG0c3AQYw7NFebUCQ==", "UBzPfwycyyJOBETwdSTG/w==", "JmKf//IQj2eMVJFTB1Feyw==", "zoCeQAIu1TFmWIYHnlYddg==", "Y6TEBwH0+CoZ50j5sQV23w==", "QgRg8usqYLpC2SzTmhUKsQ==", "KYv6PwzjV6/5I33cZ9LUmQ==", "/YcdipQjiqJUDpddwhDiIw==", "hxluEp8Si16NQcfaJDWcLg==", "+uMSPU5jbqI0+jsP/eX6PA==", "6MW1lRUdNNc4s+6uD2JNvw==", "uDfc8ZaPfrhTGcFwVaIvAA==", "r410Z5X0yojDsVg9YVcNqQ==", "X10PEbhI2yv6KYFUPacecg==", "lHLNxD93t7uUJfmDhNwvCQ==", "HHBOKYlzeD2Busv7btyBAA==", "2luu38jiVQvy6qOXHFgpAg==", "RATpPhLUqjEbe+XxyYxOOw==", "qug1advw8m4TjVAUPEUPiA==", "qYORp6v9x0Jy6S8OKerZvw==", "s6kt2DqKLHgzYSGciPtGtQ==" ], "Esfj4A6yCPG0aR5IhgHmUg==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "Gfe/qKITedzO94FGUpZ5bQ==": [ "dF1z6+GpOYLRsG5jdtVmXA==", "t7yVAsqpoU5oS0/hazJt0w==", "safHNTx9xrk8h1d1vBbgbw==" ], "GpOp3xfmb0XA+PmFyqyn0g==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "GrohJMl/MISMll2qndOSGg==": [ "arPTXFJYsCT564EgyQClGA==", "TEg+H5IUFEuL8/4VudXtEg==", "cbNKZbfbJhPfPLHi6va27w==" ], "HyWYXl8ZaOY6wtr4mKF7qA==": [ "XW4X9/W6MfETfE/VICA4Jw==", "n39YhRffL6tFFAy/S18A8Q==", "fSeU4QTAs+fY+ihLpgdM9A==", "R1x4adkbkgVhxc9hzgUZcA==" ], "IG/inuDbgBm/XuY2u/Aumw==": [ "8efBqSZ3OYqd+nT8a21FNA==", "OXr+UvfSDAQbLGP4xOBSMw==", "Rd2hVVbUws+mcvoC7DaoiQ==", "TIcWaTRsDD52irGN4xUQyA==", "GXMpRf2go/wGEbwpp9BPPQ==", "T5Nghm4crNWWnUrYvZZItg==", "BfDjqoaYrd0NKCGGxtokTg==", "tiOci2zd4htCAwtqrJPUhA==", "w8af/LTYrBLWhYkZBSi2Lg==", "Ah03jmj/7fQOqUbg05PtZg==", "rJljaCTiTdw1uI1lvfy+hw==", "2I/0B+uXhxpPJWXGwNGlLw==", "6o8ui0RxMttDzkyqTDO5tg==", "LkJjju2s50oKpBRyBT8s0A==", "Qe1reyLPtQVZ5wKqKa9jQA==", "s2uSNGuV+OyVW2eHDGWWKw==", "cMY+6QfPqyOZE380Mf5rIQ==", "9avTgsTrB6zaN8UjZ37Wow==", "kTyfGInwWoCVv7gGPYCF5g==", "1WQ/LJu/kefEuHRv58l0Lw==", "MLyBE3p9/9+LMOMl2JBi6w==", "e7h3lwyDkLbzwbeza9/TWw==", "2sm08sXcjWtT2Gtu3CdSug==", "2RZ3u6UmceVG9iB/xb73SA==", "QbgvVzhz2dr5BDvAUM6wFQ==", "rR226S9SV4WbmIVotM0CsQ==", "GfPY5zBbHJQI4ZGaDcJj2A==", "cjoCrbQlAeGxtTPUlcMPuA==", "rO5a9fYyaqaIZ4bH0M8fdA==", "bh7RRRlNP555+LOFASdB0w==", "Ob+LJ5zYHnbjt14Yf8W7UA==", "Q0D37bmhhLGtYILIAMgFXg==", "gGrGej/Pj6/poAgebFb+dg==", "QX9gQ7esz1e73iQHmwojXA==", "GnBCRP9H+R6do428z3nOkQ==", "NeZAaBfGrzLvaMKrJL7WlA==", "0YVxD0vSH+0MhijemP/Jmg==", "SvhQ7tNvl6ANrVnaJ4cBNw==", "zx97OaxgXH8j+mFWesQySQ==", "3Lvdmj//2sze9S8I3n8yrw==", "aQGx6Am8fU9TZmcyiMNL4A==", "JD0llI0bGUOG/VBz+9LeVQ==", "kaUbMItvWrS1leJMEsAk9A==", "19Kvl4LS7MCiBo2cRD5fxQ==", "b2xf65/2S45gOxG8Grxy0g==", "YUwZZ9Cg1FloxBZV60vOCg==", "cxMZ2TEnkk6RdtuU9fDThg==", "7AoZZiCMmvqX9d9WD62FnQ==", "eekbTUpqIafepE8Hfmhn6g==", "00cDk2w3qfvdzMbO27c/+w==", "BS5Qx6nN3HmM64VVoKmayw==", "lz6O0nYiDpis8SScmTUuSg==", "g6spFzT6DoopzuQCE0pjRg==", "X3WuoMxfqKQH/0bF7PkAAQ==", "3WRC4Vl08/leTJ1MFHuCEg==", "DNd0sdbW83acQbIl3FDaPw==", "Y/6FiFNJ+h2jXNTlPOzrnQ==", "5D5WFK01Su4Lrj4hhwDYGQ==", "zAQhwfD+1kpXY0CwZC6HxA==", "2UHqEqfMIIn53NkDlDEppQ==", "ylg3k+AtgUcIl3hJiXNMlw==", "dO/rj/SVo/ZlfJAB2ajOEQ==", "I3vwwgMxzxWo15otCOgvAw==", "o8O4Ttqnv0lQfm1yyfyVsw==", "+hBhqk1qKnkU+nqn6a96qg==", "tLSR0X6hQ7hvyPbBXZslBQ==", "oVgcRSL89qnSRkMXpV8N8A==", "HlOu0EmTxHkjzmJeJEuJmw==", "93O9BjbBwz1jYmTNCzgkUw==", "h+nOQU6khNxAH7kkGqVqkQ==", "6asSIEJz7ggo9QEXpbSOYg==", "AIlN8RmMOvhBveVuVAyHQQ==", "w1094TrprBpG+5TZJus6FA==", "XuMP4XKeqFlYH9jgvFKXXw==", "6dwQWrojfQ/1hgTT2PQckg==", "u1caIbS4Tk6y8c7sz8Hvhw==", "qWK7H7gz7e8gS19GJSeIIg==", "W0TAw6aTfwXOMlJwloDkZA==", "oyvtOIVUDqm1ruQx8vhRhA==", "+PjI2yN4wCMPyf1oygeT5Q==", "bACUKZThWu3kcO82NfO4eg==", "8ge47rqVvHaefMV4OlZnlQ==", "XL1Nv8y45q8aiA92A99YyA==", "0v5F4x1W0RxkklLvRs6NKQ==", "JtGggrfMckWn0xvfWBMJJQ==", "KsboTEAsiwsdLEKIDivkyA==", "0bK7Vo3x9SXQYvDvMmgzXA==", "qEhRdzGH44SGjJIcqcIv/g==", "zDmU3WG0c3AQYw7NFebUCQ==", "UBzPfwycyyJOBETwdSTG/w==", "JmKf//IQj2eMVJFTB1Feyw==", "zoCeQAIu1TFmWIYHnlYddg==", "Y6TEBwH0+CoZ50j5sQV23w==", "QgRg8usqYLpC2SzTmhUKsQ==", "KYv6PwzjV6/5I33cZ9LUmQ==", "/YcdipQjiqJUDpddwhDiIw==", "hxluEp8Si16NQcfaJDWcLg==", "+uMSPU5jbqI0+jsP/eX6PA==", "6MW1lRUdNNc4s+6uD2JNvw==", "uDfc8ZaPfrhTGcFwVaIvAA==", "r410Z5X0yojDsVg9YVcNqQ==", "X10PEbhI2yv6KYFUPacecg==", "lHLNxD93t7uUJfmDhNwvCQ==", "HHBOKYlzeD2Busv7btyBAA==", "2luu38jiVQvy6qOXHFgpAg==", "RATpPhLUqjEbe+XxyYxOOw==", "qug1advw8m4TjVAUPEUPiA==", "qYORp6v9x0Jy6S8OKerZvw==", "s6kt2DqKLHgzYSGciPtGtQ==" ], "IxIhH0Z+Om/E2wWJgs7oqA==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "J4wVTpjsd90BinvJHS7Zqw==": [ "RdY/UQx2FGTtVn1x7G1KkA==", "HxI42iSjURjRki+uV6q/9w==" ], "J9w4G6G8Fb/RA473Yv5YuA==": [ "fbRJLkkKyAqhMbdbbcLwwg==" ], "JaeGSHoaw5r486gmcDmRVA==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "JsmK7e5qrU0+Ud/3PQYUAQ==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "N0c+hlw+nQPyLzGzZPE+VQ==": [ "X3NBOrSivf9I926V0a2/oQ==", "RxiYxX3H5lL8cc7k0ac/mQ==", "GW37uYQxwwgJBIDtA/dT2g==", "fdA0Wp/waErtsQk4sTTbPQ==", "fh2y5aivazupTx0EZ+2Cag==" ], "O6NCE8KkqNnnBGJrWxfPwA==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "Ol1YWxU11Z64v1nA/zb/5w==": [ "j7yoSCks+i8LevHtgFwCwQ==" ], "PIk2BBAWexCFofMi5q03RA==": [ "S5Dzz9cigoJDCj8s5UcT0g==" ], "PxTtNNt6Us8EraFZluI++g==": [ "dF1z6+GpOYLRsG5jdtVmXA==", "t7yVAsqpoU5oS0/hazJt0w==", "safHNTx9xrk8h1d1vBbgbw==" ], "Q8V6CJq+uIfjVUujX4I61Q==": [ "S5Dzz9cigoJDCj8s5UcT0g==" ], "QXZqh0qx9Vk+bcSACeoTQg==": [ "AsiuN/8gu7sZ0PJCLihjmw==" ], "Rmp+/J0Vf6Z1c/jUFbiVFw==": [ "jAwMSdGdL8Maby3fRvFUDA==", "BbM0NZsMsZnNUi1ybIzssw==", "RxwFiIUPJYMo6r5lfv+sdQ==", "m5AiZOpiUf+2oOMwsbQnSg==", "FpA1FaTnKUwdPkl0KHAbaw==", "LyQcB6aDtcDf3FmzBVHSKQ==", "4cQAenzXciR7rLlEmdwZsQ==", "y64mIHRpNx52AEpoGbOyzQ==", "IfJyKZ52fwKruf/mbOKmYg==", "IvL651FnAzrxSYOiOuXMlw==", "Sn+Wd5xIJ9cLZDfoyJlgkw==", "F/boCR7kXAGa4+GAELD7Tg==", "y6Uu3YyF1CrzpsmxAF1m9w==", "qhxrSy/lodS857k/RFYSFg==", "TszqopCoskBv4coMA3/peg==", "by+PAyhAcd2LS2O/tZxbRQ==", "XWaBdbEJiHpYXT1f1eBk1Q==", "4vHE1o0sxmJSfgr6AiAtqA==", "7+zZLUPhCOA3BFrcusoKFg==", "ah5gJjq6ntKGHe05l2QLEA==" ], "RmtwCYp+M3KMl7TiyHKwMA==": [ "S5Dzz9cigoJDCj8s5UcT0g==" ], "ScSZYXWuosUrTT47e6vL3g==": [ "C0udSo+foVK8TphEaJ9u7g==" ], "TSs+KS9B9pkzz7FIgxu+aw==": [ "89XrIFUuuXy08LkDR6XMOw==", "g8hJlpBfWMarbfdU+OkQdw==" ], "UCztdZ6zzlJMAH60k5rqRA==": [ "6hAQW3vY9ZA/8datv1rY4g==", "2TDjlt2gAEWsLyBBPigFYw==", "7cHovEEcBoQ92zXTfFigow==" ], "W7uBqJb8l9AhSXjNg1JZQg==": [ "/rVEaWl0l9u8biVEKbZTFg==" ], "WKZFJYHmPo5x9c8JUEnETA==": [ "ixc06f0H9vqMfsbwQSwwvA==", "e0VfCD1REapdkagkByCnXQ==" ], "XTnX2VddNvCYpYt/meLgYA==": [ "0ISEnYRRDkbJFXBP9XvdpA==", "Q1F3DVZZ3gpMNQT3yhbiSg==", "7S6xxC9g1Ybp0dqQ63V8tg==" ], "YuMHdRatKmZ56mnoWUwdqw==": [ "8QRmG/+fMsQQzP2maaxOag==" ], "aVZ2bh2CbtumQqaoGUZ8hA==": [ "a9FllBAJiFi5FeYl0KG4aQ==", "aDJK/oIxfKTdGBwKif3CBA==", "Pza9Y2xtH9MChVMkZwgw2A==", "oqSc7q4k6wTno/u9knscCQ==", "G1biuc7MPjr1XA/l1R5EPQ==" ], "bJpkI/9naqJZmJnxkKD+fQ==": [ "AsiuN/8gu7sZ0PJCLihjmw==" ], "c08XsIFt/fm6inf2p0ZG8A==": [ "dKzgwwkG/spsYd8PVvrk6A==", "iPCZH9YqKm3Qb2Qeqw32sA==" ], "cHAJILwEV0OAQcBBnKqncg==": [ "XW4X9/W6MfETfE/VICA4Jw==", "n39YhRffL6tFFAy/S18A8Q==", "fSeU4QTAs+fY+ihLpgdM9A==", "R1x4adkbkgVhxc9hzgUZcA==" ], "cgBLWdUd4/YcvkaTWAC3Pg==": [ "DtWvIa+898xLj3Yf8kKjtA==", "oIBUxFCAPk4vRXBwpcmtFw==", "sAlO/t+jkkm59mLcdOgB9w==", "gNGv6C2nj/tHk2ntVJUOWw==", "EjPl60c/5Xt+2Awh7Lu5jw==", "DJqdVbXk9Oqvq0nS8VYv5Q==", "hUC86VV8kD262xFcev0ZiA==", "uEn9qA67O/SoYHOtH/EL2w==", "mmFI4mA7exd6BfbwTUwJfQ==", "Mqs34KD77Q9uZxNX/8mz0Q==", "TiGGrcjH9zkR+9PywLxD8Q==", "RoQvxPrgcpXyTej834bT2Q==", "e/bnYsWq3UNe4TO8qzzb8A==", "oZ/2a9w+ysaJ6Y0prrNk0g==", "tbkEtEs3aa+p2/YQaD8BfQ==", "Bu9dxnhmsLXDd3x0oRPHfA==", "I3+uP7bb+nPtzRYHH2UUgw==", "oGhsPyoyEtiEHT7/0qF+CQ==", "qZqMILFWCv2+sfRyc+XFfg==", "Ar1hBHxUcHiCnqL+avGJRg==", "4LZWGm07jnOHHBGX2FzAwg==", "/MgFHW097IAGIZkNc/Fltw==", "lJ8RTw7m+AgAnWW6upSntA==", "MMLwOzBcCET4jaa3dPuTwQ==", "IeTK1HBLKpS1+gfVSPrpvg==", "CQPV/OxtJ+DwYc6C4gniNQ==", "Ve1jg9SxTDjeNdfGHjxP2g==", "uO3OOEY6W3k9QH/tNVK0LQ==", "lWdVDKK0NI1ECjrQyrQZhA==" ], "cpIirH9DE6nFQZA6wIpxLg==": [ "jAwMSdGdL8Maby3fRvFUDA==", "BbM0NZsMsZnNUi1ybIzssw==", "RxwFiIUPJYMo6r5lfv+sdQ==", "m5AiZOpiUf+2oOMwsbQnSg==", "FpA1FaTnKUwdPkl0KHAbaw==", "LyQcB6aDtcDf3FmzBVHSKQ==", "4cQAenzXciR7rLlEmdwZsQ==", "y64mIHRpNx52AEpoGbOyzQ==", "IfJyKZ52fwKruf/mbOKmYg==", "IvL651FnAzrxSYOiOuXMlw==", "Sn+Wd5xIJ9cLZDfoyJlgkw==", "F/boCR7kXAGa4+GAELD7Tg==", "y6Uu3YyF1CrzpsmxAF1m9w==", "qhxrSy/lodS857k/RFYSFg==", "TszqopCoskBv4coMA3/peg==", "by+PAyhAcd2LS2O/tZxbRQ==", "XWaBdbEJiHpYXT1f1eBk1Q==", "4vHE1o0sxmJSfgr6AiAtqA==", "7+zZLUPhCOA3BFrcusoKFg==", "ah5gJjq6ntKGHe05l2QLEA==" ], "dH7n2Ct/z7JALFNo9SCMDg==": [ "jAwMSdGdL8Maby3fRvFUDA==", "BbM0NZsMsZnNUi1ybIzssw==", "RxwFiIUPJYMo6r5lfv+sdQ==", "m5AiZOpiUf+2oOMwsbQnSg==", "FpA1FaTnKUwdPkl0KHAbaw==", "LyQcB6aDtcDf3FmzBVHSKQ==", "4cQAenzXciR7rLlEmdwZsQ==", "y64mIHRpNx52AEpoGbOyzQ==", "IfJyKZ52fwKruf/mbOKmYg==", "IvL651FnAzrxSYOiOuXMlw==", "Sn+Wd5xIJ9cLZDfoyJlgkw==", "F/boCR7kXAGa4+GAELD7Tg==", "y6Uu3YyF1CrzpsmxAF1m9w==", "qhxrSy/lodS857k/RFYSFg==", "TszqopCoskBv4coMA3/peg==", "by+PAyhAcd2LS2O/tZxbRQ==", "XWaBdbEJiHpYXT1f1eBk1Q==", "4vHE1o0sxmJSfgr6AiAtqA==", "7+zZLUPhCOA3BFrcusoKFg==", "ah5gJjq6ntKGHe05l2QLEA==" ], "e9e6iwwufr2qvMYpuZgq7Q==": [ "XW4X9/W6MfETfE/VICA4Jw==", "n39YhRffL6tFFAy/S18A8Q==", "fSeU4QTAs+fY+ihLpgdM9A==", "R1x4adkbkgVhxc9hzgUZcA==" ], "enagVWadN12gI5iPYugyvg==": [ "GAn7gWUe2pFr7PbwechqxA==", "AUiFITCnRjRxctzqqbDeeA==" ], "ev4LjEwclLnf3ehIi3l8oA==": [ "RdY/UQx2FGTtVn1x7G1KkA==", "HxI42iSjURjRki+uV6q/9w==" ], "ewbqmzgK8Rzf739yT7IKUQ==": [ "/rVEaWl0l9u8biVEKbZTFg==" ], "f86Wc3apFCnJqkXk60X7Cw==": [ "8QRmG/+fMsQQzP2maaxOag==" ], "fMAVuEMmdAgbIa7mBMTdbg==": [ "AsiuN/8gu7sZ0PJCLihjmw==" ], "h7PT3q6O99+SW5+YBpMkiw==": [ "a9FllBAJiFi5FeYl0KG4aQ==", "aDJK/oIxfKTdGBwKif3CBA==", "Pza9Y2xtH9MChVMkZwgw2A==", "oqSc7q4k6wTno/u9knscCQ==", "G1biuc7MPjr1XA/l1R5EPQ==" ], "hYEisV19Dxn4PvCvxJFm5A==": [ "Ygj77GRBaQkoNVODBO6xEQ==" ], "hktk4wXij5O6pY5X6Pdp/Q==": [ "XW4X9/W6MfETfE/VICA4Jw==", "n39YhRffL6tFFAy/S18A8Q==", "fSeU4QTAs+fY+ihLpgdM9A==", "R1x4adkbkgVhxc9hzgUZcA==" ], "it/1dAj/Yqoy0694vv9wUA==": [ "dF1z6+GpOYLRsG5jdtVmXA==", "t7yVAsqpoU5oS0/hazJt0w==", "safHNTx9xrk8h1d1vBbgbw==" ], "jMxy8GAhrrA2mTT5vqlfcg==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "jxodkkAvUPklQOkQf5mRGQ==": [ "6hAQW3vY9ZA/8datv1rY4g==", "2TDjlt2gAEWsLyBBPigFYw==", "7cHovEEcBoQ92zXTfFigow==" ], "kUBCI82medWnoqu0XgvJJg==": [ "BEXy4ijrTQIkl+xEVZQ61w==", "RPWIFXazUxYQ5Q1rBYTqdg==", "bpwdCug2xQZhmaazCqwIew==", "bf41zTvm6HAv6xdiXpwGWQ==" ], "kaLLRnNrSxtvkSdcliuniA==": [ "a9FllBAJiFi5FeYl0KG4aQ==", "aDJK/oIxfKTdGBwKif3CBA==", "Pza9Y2xtH9MChVMkZwgw2A==", "oqSc7q4k6wTno/u9knscCQ==", "G1biuc7MPjr1XA/l1R5EPQ==" ], "lIAKRJe70medmtteiMTNkw==": [ "DtWvIa+898xLj3Yf8kKjtA==", "oIBUxFCAPk4vRXBwpcmtFw==", "sAlO/t+jkkm59mLcdOgB9w==", "gNGv6C2nj/tHk2ntVJUOWw==", "EjPl60c/5Xt+2Awh7Lu5jw==", "DJqdVbXk9Oqvq0nS8VYv5Q==", "hUC86VV8kD262xFcev0ZiA==", "uEn9qA67O/SoYHOtH/EL2w==", "mmFI4mA7exd6BfbwTUwJfQ==", "Mqs34KD77Q9uZxNX/8mz0Q==", "TiGGrcjH9zkR+9PywLxD8Q==", "RoQvxPrgcpXyTej834bT2Q==", "e/bnYsWq3UNe4TO8qzzb8A==", "oZ/2a9w+ysaJ6Y0prrNk0g==", "tbkEtEs3aa+p2/YQaD8BfQ==", "Bu9dxnhmsLXDd3x0oRPHfA==", "I3+uP7bb+nPtzRYHH2UUgw==", "oGhsPyoyEtiEHT7/0qF+CQ==", "qZqMILFWCv2+sfRyc+XFfg==", "Ar1hBHxUcHiCnqL+avGJRg==", "4LZWGm07jnOHHBGX2FzAwg==", "/MgFHW097IAGIZkNc/Fltw==", "lJ8RTw7m+AgAnWW6upSntA==", "MMLwOzBcCET4jaa3dPuTwQ==", "IeTK1HBLKpS1+gfVSPrpvg==", "CQPV/OxtJ+DwYc6C4gniNQ==", "Ve1jg9SxTDjeNdfGHjxP2g==", "uO3OOEY6W3k9QH/tNVK0LQ==", "lWdVDKK0NI1ECjrQyrQZhA==" ], "lNWcYbl6h71sUZV6B4E+bw==": [ "j7yoSCks+i8LevHtgFwCwQ==" ], "lV2MRz2nTh21rS47LJ6XIQ==": [ "gpPTgXxcA95Uk2vaf3/2dw==", "TsVNXuAeF3PhiRZhIOjjtQ==", "DtkRUkQTzcJrj8ZsC36kqQ==", "o16kBwzDyL2DXuhbCPWX9Q==" ], "mWpxQAUiV6nN451/LkTR5w==": [ "8QRmG/+fMsQQzP2maaxOag==" ], "n7aNrQrPqOi9MYUVRT/saQ==": [ "ixc06f0H9vqMfsbwQSwwvA==", "e0VfCD1REapdkagkByCnXQ==" ], "n7mOL22NuOUufoEmlGqORw==": [ "XPUXyp+BOEJyEGOgXafi8Q==" ], "pvBQbvRSWZsI3DUucyjs+A==": [ "fbRJLkkKyAqhMbdbbcLwwg==" ], "q8h8ag3Ho33Zc/60lMOvVA==": [ "xQ6R88+x8IssPvOAavmZXw==", "r3RLKNYtYvKarBqnnrlrew==", "Z0bbSkX8e3OUKdJa86CbBw==" ], "qGKV3oqLguMWpyzvjv1+wg==": [ "uglqkYqbcsDd4SCu9NI2Ww==", "uFXEnN9gepJ4+HtQWdLrOg==", "GuM8+Ku1VtBzfPk3/FCgzw==", "TNb7OrRxFn2Bis7zp2oi8A==", "FAgeMhGaGcH9QOhQHw5rhQ==", "6J86dffyd+kQEKbjTTbD2Q==", "sSpyMuxbh/+/Nula2ikXPw==", "Ub9JoNToSyT09hD5MOIlGA==", "Ihq7mkhGM9sf/8QM05o7gw==", "0u2Zo3eZYFAXhVSIZh+vXQ==", "+o9j0Llb6+ISl2S6vmkRkQ==", "q4W6wpO2YbOLS87LUXPVBw==", "KC4H6WRPkYrWvXb9OC+odg==" ], "rY/kE/V4JnxYoqV+lmc9mg==": [ "DDxCHnX+kCqcRQj9b90/cg==" ], "rflqn7XKJvnH8dP67kgM7A==": [ "ydN/9qW+IO/7qUsy09APhw==", "Av6IvPz8z+8JAyypXmkbTA==", "hGz8R5Dny4UCIDPZzXbK3g==", "SPxMxLW2DZ8IvP04UR/H6g==" ], "sOl5EHhMcC/OeH5rJHkypQ==": [ "BEXy4ijrTQIkl+xEVZQ61w==", "RPWIFXazUxYQ5Q1rBYTqdg==", "bpwdCug2xQZhmaazCqwIew==", "bf41zTvm6HAv6xdiXpwGWQ==" ], "su3U01UxGSz5b2TyKbsC/w==": [ "gpPTgXxcA95Uk2vaf3/2dw==", "TsVNXuAeF3PhiRZhIOjjtQ==", "DtkRUkQTzcJrj8ZsC36kqQ==", "o16kBwzDyL2DXuhbCPWX9Q==" ], "tYvC71hd5ARf4WITmeyfxA==": [ "S5Dzz9cigoJDCj8s5UcT0g==" ], "ttbQC41rI30fYBaVUH1hLQ==": [ "a8lEoliaJpwjl9bCwQSdLA==" ], "w9ndxjIpPQXv3PDulnya7A==": [ "arPTXFJYsCT564EgyQClGA==", "TEg+H5IUFEuL8/4VudXtEg==", "cbNKZbfbJhPfPLHi6va27w==" ], "wYIIhtw19AhoRPO0XAvoxw==": [ "Rs2w9Uui+dW2Lg48Ml6jpw==", "fwfAtjf5gVRneidAp93edQ==", "2SApI7oHpcm9Z48+2Hj11w==", "Kqq2xlybjD/tOLmQWu2xPw==", "h08ca9AawAYymWtiO1A44A==", "VWEbeFnFOHy1IkG21b5a5g==", "xxrOMZzPk7ETmnvrIjBo0A==" ], "wfJGCqOH8d+IYg/dAepx1A==": [ "Rs2w9Uui+dW2Lg48Ml6jpw==", "fwfAtjf5gVRneidAp93edQ==", "2SApI7oHpcm9Z48+2Hj11w==", "Kqq2xlybjD/tOLmQWu2xPw==", "h08ca9AawAYymWtiO1A44A==", "VWEbeFnFOHy1IkG21b5a5g==", "xxrOMZzPk7ETmnvrIjBo0A==" ], "ww1NPX/mwmdtd47p1Hp8FQ==": [ "arPTXFJYsCT564EgyQClGA==", "TEg+H5IUFEuL8/4VudXtEg==", "cbNKZbfbJhPfPLHi6va27w==" ], "xTea8RVD9wez5DTFDIkCYg==": [ "uglqkYqbcsDd4SCu9NI2Ww==", "uFXEnN9gepJ4+HtQWdLrOg==", "GuM8+Ku1VtBzfPk3/FCgzw==", "TNb7OrRxFn2Bis7zp2oi8A==", "FAgeMhGaGcH9QOhQHw5rhQ==", "6J86dffyd+kQEKbjTTbD2Q==", "sSpyMuxbh/+/Nula2ikXPw==", "Ub9JoNToSyT09hD5MOIlGA==", "Ihq7mkhGM9sf/8QM05o7gw==", "0u2Zo3eZYFAXhVSIZh+vXQ==", "+o9j0Llb6+ISl2S6vmkRkQ==", "q4W6wpO2YbOLS87LUXPVBw==", "KC4H6WRPkYrWvXb9OC+odg==" ], "xvET6Njr4M7QE6Z5iUtA9g==": [ "dF1z6+GpOYLRsG5jdtVmXA==", "t7yVAsqpoU5oS0/hazJt0w==", "safHNTx9xrk8h1d1vBbgbw==" ], "y8SuAyUvVIkzKZ1B4+P8EQ==": [ "dF1z6+GpOYLRsG5jdtVmXA==", "t7yVAsqpoU5oS0/hazJt0w==", "safHNTx9xrk8h1d1vBbgbw==" ], "zDt2Vfv35KL/GbH9JG8H3A==": [ "arPTXFJYsCT564EgyQClGA==", "TEg+H5IUFEuL8/4VudXtEg==", "cbNKZbfbJhPfPLHi6va27w==" ] }, "enrichments": {} }